ClawCloudClawCloud.sh
How it worksModelsPricingCompareGuidesBlog
Log in
DeployDeploy Now
ClawCloud logoClawCloud

Managed OpenClaw AI assistant hosting on dedicated cloud servers.

Deploy now →
Product
ModelsPricingCompare PlansOpenClaw HostingOpenClaw VPSOpenClaw CloudTelegram BotDiscord BotFeishu BotUse CasesFAQ
Resources
GuidesBlogTopicsOpenClawGitHub
Company
ContactTerms of ServicePrivacy Policy
© 2026 ClawCloud. All rights reserved.
All guides

How to Secure Your OpenClaw Setup

Security checklist for an OpenClaw deployment

A front-page Hacker News post recently warned about "many OpenClaw plugins with malware." Whether you self-host or use managed hosting, some security basics are worth getting right from day one.

Vet skills before installing

Skills extend what your OpenClaw bot can do. They're installed from ClawHub using clawhub install <slug> — not openclaw install. Before installing anything:

  1. Check the publisher. ClawHub shows who published each skill. Stick to well-known publishers or skills with source code you can read.
  2. Read the SKILL.md. Every skill contains a SKILL.md file describing what it does and what tools it uses. If a skill requests filesystem access, network access, or shell execution — make sure that's actually needed for what it claims to do.
  3. Search for known issues. Check the skill's GitHub repo for open issues and security reports.

Skills are not plugins. Plugins can ship skills, but skills and plugins are different systems. Don't install a plugin when you meant to install a skill.

Protect your API keys

BYOK mode (the default on ClawCloud): your API key is stored in openclaw.json on the server. SSH access to your server means access to your key. If you share server access, consider rotating your API key periodically through your provider's dashboard.

Managed mode: ClawCloud provisions an isolated OpenRouter sub-key per instance. You never handle the key directly — it's generated during provisioning and rotated automatically on each billing cycle. No API key in any config file you can see.

Never paste API keys in chat messages, public repos, or skill configurations. If a skill asks for an API key as input, that's a red flag.

Enable gateway auth mode

Since OpenClaw 2026.3.7, the gateway requires explicit gateway.auth.mode when both a token and password are configured. This prevents unauthorized clients from connecting to your OpenClaw instance when dual-auth is in use.

On ClawCloud, gateway auth is enabled by default during provisioning. If you self-host and use both a gateway token and password, make sure your config includes the explicit gateway.auth.mode setting.

Lock down network access (self-hosted)

If you run OpenClaw on a VPS:

  1. Enable UFW (or your firewall of choice). Only open the ports your channels actually need.
  2. Block the gateway port from public access unless you specifically need remote gateway connections. The gateway is for local client pairing, not public traffic.
  3. Use SSH keys, not passwords. Disable password authentication in sshd_config.

ClawCloud instances come with UFW pre-configured and the gateway locked to localhost.

Set DM and group policies

OpenClaw's DM policy settings and group chat settings control who can interact with your bot. On a fresh install, the defaults are open — your bot responds to anyone who messages it.

Tighten this if your bot has access to skills that handle sensitive data. Use allowlist to restrict to specific sender IDs, and configure group settings to limit which groups the bot responds in.

Keep OpenClaw updated

The 2026.3.8 release hardened gateway restart recovery across both macOS and Linux. The 2026.3.7 release added mandatory gateway auth for dual-credential configs. Security fixes ship in every release — running an old version means missing them.

ClawCloud handles auto-updates. If you self-host, run openclaw --version to check your current version and update regularly.

For more on the full list of OpenClaw channels and what each one requires, see the channels documentation. For ClawCloud's approach to managed security, see Getting Started.

Ready to deploy?

Skip the setup — your OpenClaw assistant runs on a dedicated server in under a minute.

Deploy Your OpenClaw

Keep reading

Bot ConfigurationSelf-Hosting OpenClawAll topics →
Post

Best OpenClaw Alternatives in 2026

Best OpenClaw alternatives in 2026, grouped by what you actually want: hosted OpenClaw, Claude Code, LangChain, NanoClaw, or IronClaw.

Post

OpenClaw vs Claude: Bot runtime vs Claude app vs Claude Code

OpenClaw vs Claude compares a self-hosted chat runtime with Claude.ai and Claude Code, so you can pick the right tool for chat, coding, or both.

Post

ClawCloud vs Clawy vs Donely: OpenClaw Hosting Compared

Comparing ClawCloud, Clawy, and Donely on OpenClaw hosting, pricing, and customization. ClawCloud is the stronger pick for control.

Post

OpenClaw Managed Hosting vs Self-Setup: An Honest Comparison

What actually happens when you self-host OpenClaw versus using managed hosting like ClawCloud. Real failure modes, real trade-offs.

Post

How to Install Custom OpenClaw Skills via Chat

Learn how to create and install custom OpenClaw skills by dropping a zip file into Telegram, Discord, or Feishu. No SSH or server access required.

Post

Why OpenClaw npm install Fails (and How to Actually Fix It)

Fix npm install failed for openclaw@latest, sharp/libvips, PATH, permission, and openclaw onboard command not found on macOS and Linux.