This could really ruin some people's day. A private message left on their agents to tip people off that their agents are vulnerable feels a lot less destructive.
I wouldn't call this _responsible_ disclosure, but setting up software that is known to be riddled with security holes and granting it both direct access to the internet and to user data is - frankly - so irresponsible that it borders on negligence. If we had stronger standards for software engineering and IT we would call it malpractice.
But TIL that OpenClaw's UI is built with Lit and web components. Cool side note at least.
https://github.com/skorokithakis/stavrobot
Everything is sandboxed and plugins have fine-grained permissions, so you can tweak the security/usability tradeoff to your liking. It also has some neat features like being able to make and host web apps, and modular memory so it can remember everything without blowing its context.
Is it typical or even possible to configure OpenClaw in another way? Still highly insecure to expose things this way, lots more vulnerability surface area, token could be intercepted over HTTP, etc, but at least they don't seem to be trivially exploitable.
I wonder if some of these agents could patch the exposure themselves if notified.
> BUILD WITH VIVGRID Ship Secure Enterprise AI Agents 10× Faster with
An OpenBotnet ready to be taken over.
himata4113•1h ago