OmniClaw
Back to blog
SecurityMarch 28, 2026·7 min read

OpenClaw Security: Why Your AI Assistant Needs Its Own VM

Over 220,000 OpenClaw instances are exposed to the internet. Most run on shared infrastructure where a single vulnerability can compromise every tenant. Here is why that matters and what the alternative looks like.

The Scale of the Problem

OpenClaw has grown from a niche project to one of the most popular open-source AI assistant frameworks. That growth comes with a security surface that most users do not think about.

A Shodan scan reveals over 220,000 OpenClaw instances with exposed ports. Many run default configurations with no authentication, no TLS, and no network isolation. These instances hold WhatsApp session tokens, API keys for LLM providers, and often personal conversation history.

Shared Infrastructure Means Shared Risk

Most managed OpenClaw platforms use container-based hosting. Your instance runs as a Docker container or Kubernetes pod alongside other users. This is efficient. It is also a problem.

Containers share the host operating system kernel. A kernel exploit in one container can affect every container on the same host. This is not theoretical — it happens regularly. When your AI agent has access to your WhatsApp account and API keys, a shared kernel is a shared liability.

Container Isolation vs VM Isolation

The difference matters. Here is a simplified view:

Containers (Docker, Kubernetes)

  • Share the host kernel with every other container
  • Isolation comes from Linux namespaces and cgroups — software boundaries
  • A kernel vulnerability breaks the isolation for all tenants
  • Fast to start, efficient with resources

MicroVMs (Firecracker)

  • Each instance gets its own dedicated Linux kernel
  • Isolation enforced by hardware virtualization (KVM) — the CPU itself
  • A kernel vulnerability in one VM cannot affect another
  • Nearly as fast as containers thanks to snapshot restore

CVE-2026-25253: A Real-World Example

In early 2026, CVE-2026-25253 disclosed a remote code execution vulnerability in OpenClaw's message processing pipeline. An attacker could craft a message that executed arbitrary code on the host — a 1-click RCE that required nothing more than sending a WhatsApp message.

This affected an estimated 40,000 instances running vulnerable versions. On shared container platforms, a single exploited instance could pivot to neighboring containers through the shared kernel. On VM-isolated infrastructure, the blast radius was limited to a single user's sandbox.

Why Firecracker MicroVMs Are Different

Firecracker is the virtualization technology built by Amazon for AWS Lambda and Fargate. It was purpose-built for multi-tenant workloads where isolation cannot be optional.

  • Minimal attack surface — Firecracker implements fewer than 30 device emulations, compared to hundreds in QEMU. Less code means fewer vulnerabilities.
  • Hardware-enforced boundaries — Uses KVM (kernel-based virtual machine) for isolation. The CPU enforces the boundary, not software.
  • Sub-200ms boot — Snapshot restore means microVMs start almost as fast as containers. You do not pay a performance penalty for better security.
  • Jailer process — Each Firecracker process runs in its own chroot, cgroup, and namespace. Defense in depth beyond the VM boundary.

What OmniClaw Does Differently

OmniClaw runs every OpenClaw instance in its own Firecracker microVM. Here is what that means in practice:

  • Per-user VM — Your agent has its own kernel, its own filesystem, its own network stack. No other user's code runs on your kernel.
  • Encrypted credential vault — API keys and session tokens are stored in an encrypted vault outside the sandbox. They are injected at runtime and never written to the VM filesystem. If the sandbox is compromised, your credentials are not.
  • Network isolation — Each VM has its own virtual network interface with egress filtering. Your agent cannot reach other agents. Other agents cannot reach yours.
  • Auto-destroy — Idle VMs are destroyed after a configurable period. No persistent attack surface for unused instances.

The Credential Storage Problem

Most OpenClaw deployments store credentials in one of two ways:

  • Plaintext on the filesystem — The default for self-hosted setups. API keys sit in .env files or config directories. Anyone with filesystem access has your keys.
  • Environment variables — Better than files, but still visible to any process inside the container. On shared platforms, container escape means credential theft.

OmniClaw takes a different approach: vault injection. Credentials are decrypted and injected into the VM's environment only at boot. They live in memory, not on disk. The vault itself is outside the VM boundary. Even if an attacker gains code execution inside your sandbox, the vault is unreachable. Read more about our approach on the security page.

Run your agent in isolation

Every OmniClaw instance gets its own Firecracker microVM. $5 free credit, no card required.

Deploy now

Further Reading