
Your AI Assistant is Leaking Everything: 42K Exposed Instances, Critical CVEs, and How to Protect Yourself
TL;DR 42,000 OpenClaw AI assistant instances are exposed on the public internet. 93% have critical authentication bypass vulnerabilities. One security researcher found 1.5 million compromised API tokens, 35,000 exposed user emails, and 341 malicious skills in the community store. A single CVSS 8.8 remote code execution vulnerability (CVE-2026-25253) allows malicious websites to hijack your AI assistant and steal everything. If you're using a public OpenClaw instance, assume your sensitive data is compromised. What You Need To Know 42,089 exposed instances — OpenClaw (sovereign AI framework) deployed publicly with no authentication by default 93% have critical flaws — Authentication bypass (CVE-2026-25253 CVSS 8.8), credential theft, RCE via WebSocket hijacking 1.5M API tokens leaked — Moltbook backend misconfiguration exposed tokens, emails, conversation history CVE-2026-25253 — One-click RCE: malicious websites hijack active bots via WebSocket, give attackers shell access CVE-2026-274
Continue reading on Dev.to
Opens in a new tab




