AppSOC is now PointGuard AI

OpenClaw/Moltbot Agent Control Plane Exposure

Key Takeaways

  • Independent research found hundreds to over a thousand exposed OpenClaw/Moltbot agent control instances on the public internet.
  • Exposed control panels leaked API keys, private conversation histories, and configuration data.
  • Misconfiguration often left agents with no authentication, enabling remote command execution.
    OpenClaw agents are designed to operate with elevated permissions, increasing impact. 
  • This represents broader ecosystem control plane exposure beyond the previously documented MCP flaw. 

Exposed Agent Control Interfaces and Credential Leakage

Security researchers analyzing the popular autonomous AI agent platform now branded OpenClaw (formerly Clawdbot and Moltbot) identified a systemic exposure problem where numerous agent instances were publicly reachable without authentication and leaking sensitive data. This issue amplifies the risks recorded in the existing MCP incident by demonstrating real-world misconfigurations across multiple deployments. (Cyber Security News)

Over 900 unique agent gateways were found on the public internet with control panels reachable without authentication, exposing API keys, chat histories, and configuration details. Similar analysis by independent researchers using Shodan and Censys identified over 1,100 exposed agent instances where default settings left administrative interfaces unprotected. (Breached Company)

These exposed control planes mean that unauthorized actors could potentially read sensitive agent state, retrieve credentials, or even issue commands. In some documented cases, exposed instances supported remote execution in addition to data leakage. (BeyondMachines)

What We Know

Originally launched as Clawdbot, the agent platform went viral due to its ability to automate tasks ranging from email to calendar updates and messaging across platforms, and was later rebranded to Moltbot for legal reasons before settling on OpenClaw. (The Register)

The agent is designed to integrate with third-party services using elevated privileges and workflows that can access email, files, and other personal data. However, the combination of powerful access and lax defaults has created a large control plane attack surface. OpenClaw’s control interfaces, originally intended for local administration, were often left exposed to the internet, giving attackers or unauthenticated users direct access to internal data and actions. (Bitdefender)

The risks appear systemic rather than isolated. In addition to exposed admin interfaces, research has documented:

  • API keys and secrets stored in plaintext or predictable paths. 
  • Prompt injection and misconfiguration risks leading to unauthorized behavior.
  • Instances without proper network protection or authentication requirements.

How the Breach Happened

This exposure is primarily caused by default misconfiguration and assumptions about LAN-only deployment. Many users deployed OpenClaw with the default control panel exposed on ports reachable from the internet. Tools like Shodan quickly indexed those instances, showing hundreds to over a thousand reachable endpoints. 

Because the platform is autonomous and executes commands on behalf of users, an exposed control panel functions as a de facto master key into its data and action surface. API keys stored on these systems — for example, keys for GPT providers or SaaS APIs — are logically identical to credentials for downstream services, and extracting them enables further compromise.

This is a classic “control plane exposure” scenario: a benign administrative interface becomes a remote entry point when not protected by authentication or segmentation.

Why It Matters

This incident extends beyond the previously documented MCP vulnerability. While the original MCP issue highlighted how protocol misconfiguration could give attackers tool access, the control plane exposure reflects observed misdeployment and default configuration risk at scale.

Exposed agent control planes leaking credentials pose direct threats to system integrity:

  • API keys and tokens can be stolen and reused for unauthorized actions. 
  • Private conversation histories and command logs can be read by attackers.
  • Remote command execution may be possible depending on the exposure context. 

Given the rapid adoption of OpenClaw and its autonomous nature, the blast radius includes not just power users but potentially enterprise resources where such agents are experimented with locally or in BYOD environments. (Venturebeat)

PointGuard AI Perspective

This incident underscores that agentic AI risks go beyond model responses or single protocol flaws. Control plane exposure and insecure defaults can convert powerful tools into significant vulnerabilities when deployed at scale.

PointGuard AI helps organizations mitigate these risks by:

  • Enabling runtime visibility into agent control and API usage, detecting unexpected open interfaces.
  • Policy enforcement around authenticated access to administrative endpoints.
  • Detection of credential exposure patterns such as plaintext API keys and config leaks.
  • Guardrails to deny autonomous agent actions that lack proper authorization context.

Securing autonomous AI agents requires a combination of runtime defense, API governance, and deployment hardening, not just model behavior controls.

Source: AI Runtime Defense
Source: AI Security Incident Tracker
Source: AI Supply Chain Security

Incident Scorecard Details

Total AISSI Score: 8.1/10

Criticality = 8.5, Control plane exposure and credential leakage at scale, AISSI weighting: 25%
Propagation = 8.0, Hundreds to over a thousand exposed instances, AISSI weighting: 20%
Exploitability = 8.0, Minimal authentication barriers, AISSI weighting: 15%
Supply Chain = 7.5, Autonomous agent frameworks and defaults, AISSI weighting: 15%
Business Impact = 8.0, Credential theft and remote access risk, AISSI weighting: 25%

Sources

  • OpenClaw/Moltbot agent exposure research on exposed interfaces and API key leakage. (Cyber Security News)
  • Reports on exposed agent instances and misconfigurations enabling unauthorized access. (Breached Company)
  • Misconfigured Clawdbot/Moltbot control panels leaking sensitive data. (Bitdefender)
  • OpenClaw design and security criticism and risk context.

AI Security Severity Index (AISSI)

0/10

Threat Level

Criticality

8.5

Propagation

8

Exploitability

8

Supply Chain

7.5

Business Impact

8

Scoring Methodology

Category

Description

weight

Criticality

Importance and sensitivity of theaffected assets and data.

25%

PROPAGATION

How easily can the issue escalate or spread to other resources.

20%

EXPLOITABILITY

Is the threat actively being exploited or just lab demonstrated.

15%

SUPPLY CHAIN

Did the threat originate with orwas amplified by third-partyvendors.

15%

BUSINESS IMPACT

Operational, financial, andreputational consequences.

25%

Watch Incident Video

Ready to get started?

Our expert team can assess your needs, show you a live demo, and recommend a solution that will save you time and money.