BACK TO ARCHIVE
2026-02-08P1 CRITICAL
CASE #0052

The Private Key in a Public Repo

A user's OpenClaw bot had its crypto wallet drained after the private key was committed to a public GitHub repository.

CLOSED
🔓 SECURITY LEAK💸 FINANCIAL RUIN
Incident Brief

A user configured their OpenClaw bot for crypto trading and stored the wallet's private key in the project's configuration file. When they pushed the project to a public GitHub repository, automated scanners found the key within minutes. The wallet was drained of $200 before the user even realized what had happened. While the amount was small, the incident highlighted a systemic problem: OpenClaw's configuration files regularly contain API keys, tokens, and credentials, and many users don't understand gitignore.

AFFECTED USERS: ~1

ESTIMATED COST: $200

Root Cause

The Actual Culprit

OpenClaw stores sensitive configuration in plain text files without warning users about git exposure. No secret detection or .gitignore template is provided by default.

What Was Done
[OK]Rotated all exposed credentials immediately
[--]Attempted to recover funds (unsuccessful)
[OK]Added .gitignore template to prevent future exposure
[OK]Shared the experience to warn others
Lessons Learned
🔑

Never store secrets in config files

Use environment variables, secret managers, or encrypted vaults. Never plain text files that might end up in version control.

🤖

Automated scanners are faster than you

Bots scan every public GitHub push in real-time. By the time you notice your mistake, it's already been exploited.

📄

Ship with .gitignore by default

Frameworks should include a comprehensive .gitignore that covers all configuration files containing potential secrets.

Comments (0)

Loading comments...

0/1000
Case Info
Case Number
#0052
Severity
🔥P1 CRITICAL
Severity Level
Date
2026-02-08
Affected Systems
• Crypto Wallet
• GitHub Repository
• OpenClaw Configuration