BACK TO ARCHIVE
2026-03-17P0 CATASTROPHIC
CASE #0045

40,000 Servers Wide Open to the Internet

Over 40,000 self-hosted OpenClaw instances were found exposed to the internet, with 12,800 actively leaking API keys.

INVESTIGATING
🔓 SECURITY LEAK📢 PR NIGHTMARE
Incident Brief

SecurityScorecard researchers discovered 40,214 exposed OpenClaw instances across 28,663 unique IP addresses. Of these, 12,800 were actively leaking API keys and credentials, allowing anyone on the internet to walk right in. 549 instances were already linked to prior breach activity. The default OpenClaw configuration binds to 0.0.0.0 without authentication, meaning every user who skipped the security docs left their entire digital life accessible to the world.

AFFECTED USERS: ~40,000

ESTIMATED COST: $2,000,000

Root Cause

The Actual Culprit

OpenClaw's default configuration prioritizes ease of setup over security. The gateway binds to all interfaces with no authentication, and the documentation buries security hardening in optional advanced guides.

What Was Done
[OK]Community published security hardening checklists
[OK]OpenClaw updated default config to localhost-only binding
[--]Relied on users to voluntarily patch their setups
[OK]Hosted alternatives promoted as secure-by-default option
Lessons Learned
🔒

Secure by default, not by choice

If security requires the user to read a guide, most users will be insecure. Defaults should be locked down.

🏠

Self-hosting is not self-securing

Owning the server gives you control. It does not give you competence. Most users cannot secure a public-facing service.

📈

Exposure compounds over time

Every day an insecure instance stays online, the probability of compromise approaches 1.

Comments (0)

Loading comments...

0/1000
Case Info
Case Number
#0045
Severity
💀P0 CATASTROPHIC
Severity Level
Date
2026-03-17
Affected Systems
Self-hosted OpenClaw Instances
Connected APIs
User Credentials