Secure your OpenClaw in 60 seconds.
OpenClaw had 7 CVEs in 60 days. ClawHavoc injected 1,184 malicious skills into ClawHub. Ship Safe scans your agent configs, MCP servers, and skills before attackers exploit them.
6 critical attack vectors. One command.
Every check maps to a real CVE, OWASP Agentic Top 10 control, or active campaign.
Public Gateway Binding
OpenClaw bound to 0.0.0.0 exposes your agent to the entire network. ClawJacked (CVE-2026-25253, CVSS 8.8) exploits this for full agent takeover via WebSocket.
Missing Authentication
No auth configured means anyone who can reach your OpenClaw instance can control your agent — execute commands, read files, exfiltrate data.
Malicious Skills (ClawHavoc)
1,184 malicious skills were uploaded to ClawHub delivering the AMOS stealer. Ship Safe checks skill hashes against known IOCs and analyzes skill code for malicious patterns.
Prompt Injection in Config Files
Attackers inject "ignore previous instructions" into .cursorrules, CLAUDE.md, or agent memory files to hijack AI agents. Ship Safe detects 15+ injection patterns.
Malicious Claude Code Hooks
Check Point disclosed RCE via malicious hooks in .claude/settings.json. Ship Safe scans hooks for shell commands, piped downloads, and encoded payloads.
Unencrypted WebSocket
Using ws:// instead of wss:// transmits all agent communication in plaintext — credentials, code, and commands visible to anyone on the network.
Scan. Fix. Red team. Repeat.
Four modes, one tool. No API keys. No cloud. Everything runs locally.
Scan
Full security audit of your OpenClaw config, MCP servers, skills, and agent instruction files.
npx ship-safe openclaw .Auto-fix
Rebind to localhost, add auth, upgrade to wss://, enable safeBins. One flag.
npx ship-safe openclaw . --fixRed Team
7 adversarial tests simulating ClawJacked, prompt injection, data exfiltration, and encoded payloads.
npx ship-safe openclaw . --red-teamSkill Scanner
Analyze any skill before installing. Typosquatting detection, static analysis, and threat intel matching.
npx ship-safe scan-skill <url>Harden with --fix
Ship Safe rewrites your openclaw.json to close every attack vector automatically.
✘ Vulnerable
{
"host": "0.0.0.0",
"port": 3100,
"url": "ws://my-server:3100",
"skills": [
{ "name": "unknown-skill" }
]
}✔ Hardened
{
"host": "127.0.0.1",
"port": 3100,
"auth": { "type": "apiKey" },
"url": "wss://my-server:3100",
"safeBins": ["node", "git"],
"skills": []
}The OpenClaw security timeline
ClawJacked
Full agent takeover via WebSocket. Any OpenClaw instance bound to 0.0.0.0 without auth is vulnerable. Attackers can execute commands, read files, and exfiltrate data.
ClawHavoc
1,184 malicious skills uploaded to ClawHub — roughly 20% of the registry. Skills delivered the AMOS stealer targeting macOS and Linux credential stores.
Claude Code Hooks RCE
Remote code execution via malicious hooks in .claude/settings.json. Any repo with a compromised hooks config can execute arbitrary commands on the developer's machine.
OWASP Agentic Top 10
OWASP released ASI01–ASI10 covering goal hijacking, tool misuse, privilege abuse, and supply chain attacks specific to AI agents.
Start scanning in one command.
Free, open source, runs locally. No signup, no API keys, no data sent anywhere.