OpenClaw privilege escalation vulnerability
Vulnerability details
- CVE-2026-33579 is described as a privilege-escalation bug in OpenClaw’s pairing/approval logic.
- The core issue: an earlier fix passed caller scopes into a device-approval check for the gateway RPC path, but the
/pair approveplugin command path did not. - When
callerScopeswas missing, the core logic “failed open,” letting a client with limited permissions approve a pending device request for broader scopes (including admin). - Exploit path (per project maintainer): requires an already-paired client with gateway access and command ability, which can then escalate from pairing/write to admin.
- It’s argued this is not literally “any random Telegram/Discord message gets admin,” though any command-capable integration reaching
/pair approvecould trigger it.
How exposed are instances?
- Multiple comments question claims that “135k instances are public” and “63% have zero auth,” noting no credible source cited and that the original Reddit post was removed.
- Others argue even conservative numbers would still mean a large, serious exposure.
- Disagreement over defaults:
- Some say binding to
0.0.0.0was default for some services until recently. - Others insist documentation always warned against public exposure and most users are single-user or behind auth/VPN.
- Some say binding to
- Overall: scale of real-world compromise is unclear and statistics are contested.
Security posture and codebase
- Strong criticism that OpenClaw is “vibe-coded” bloat: millions of lines, very fast commit rate, and ~1.8 CVEs/day since launch (per an external tracker mentioned in-thread).
- Some argue integrating with many tools inherently enlarges the attack surface, even with good engineering.
- Suggestions: run on VPS/VMs, separate Unix users, kernel-level sandboxing (Landlock/Seccomp/eBPF, macOS sandbox-exec), strict network/filesystem isolation.
- There is mention of industry partners (large tech companies) helping harden security and of NemoClaw as a security wrapper.
Use cases and enthusiasm vs skepticism
- Enthusiastic users describe:
- Agentic cron jobs and orchestrating other agents.
- Civic-data scraping, gym slot booking, home automation, media server control.
- Long-running code-generation and deployment tasks.
- Many refuse to connect personal email/accounts, keeping instances isolated with limited blast radius.
- Skeptics question why anyone would give such a system broad access, call it a “toy,” or say anyone running it has already accepted major risk.
Broader themes and moderation
- Broader worries: LLMs as tireless attackers, “Internet of insecure things,” and that casual users don’t understand the risks.
- Counterpoint accusations of “Ludditism”; some say all new tech is rough and people should “figure it out.”
- HN moderators intervene against personal attacks and mob behavior, emphasizing civil, substantive criticism.