Wu Shuo learned that the GoPlus Chinese community tweeted a reminder that the OpenClaw Gateway has a serious security vulnerability and must be immediately upgraded to OpenClaw 2026.2.25 or a later version; audit and revoke unnecessary credentials, API keys, and node permissions for Agent instances. The complete attack chain includes: the victim visiting a malicious website controlled by the attacker in their browser; JavaScript on the page initiating a WebSocket connection to the OpenClaw Gateway on the localhost; then, the attack script attempting to brute-force the gateway password hundreds of times per second; after successfully cracking the password, the attack script silently registers as a trusted device; the attacker gains administrator-level control of the Agent. OpenClaw runs through a WebSocket Gateway bound to the localhost, which serves as the core coordination layer for the Agent and is an important component of OpenClaw.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)