
BREAKING: Any Website Can Silently Hijack Your OpenClaw Agent (Oasis Security)
Oasis Security just dropped a bombshell: any website you visit can silently take full control of your OpenClaw agent. No plugins needed. No user interaction. Just visit a malicious page. Source: Oasis Security Research | Video PoC The Attack Chain Developer has OpenClaw running on localhost (the default setup) Developer visits any malicious/compromised website JavaScript on the page opens a WebSocket to localhost on OpenClaw's gateway port WebSocket connections to localhost are NOT blocked by cross-origin policies Script brute-forces the gateway password — hundreds of attempts/second The gateway's rate limiter exempts localhost connections entirely Once authenticated, the script registers as a trusted device Gateway auto-approves device pairings from localhost with no user prompt Attacker has full control: read messages, exfiltrate files, execute shell commands This is equivalent to full workstation compromise , initiated from a browser tab. Why This Is Different Previous OpenClaw vuln
Continue reading on Dev.to Webdev
Opens in a new tab




