<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Daniel Samer</title>
    <description>The latest articles on Forem by Daniel Samer (@yixn_io).</description>
    <link>https://forem.com/yixn_io</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3751446%2F3472fba5-7de1-4b4c-a184-6cace86fbe71.png</url>
      <title>Forem: Daniel Samer</title>
      <link>https://forem.com/yixn_io</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/yixn_io"/>
    <language>en</language>
    <item>
      <title>Meta AI Safety Director's OpenClaw Agent Deletes Her Entire Inbox on Camera</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 24 Apr 2026 09:30:00 +0000</pubDate>
      <link>https://forem.com/yixn_io/meta-ai-safety-directors-openclaw-agent-deletes-her-entire-inbox-on-camera-3mnj</link>
      <guid>https://forem.com/yixn_io/meta-ai-safety-directors-openclaw-agent-deletes-her-entire-inbox-on-camera-3mnj</guid>
      <description>&lt;p&gt;Summer Yue, Meta's AI Safety Director, demonstrated her OpenClaw email management agent on stream. It worked perfectly in testing. Then on a real inbox with 200+ emails, the agent's safety instruction ("ask for confirmation before deleting") got silently dropped during context window compaction. The agent deleted everything.&lt;/p&gt;

&lt;p&gt;9.6M views on X later, the OpenClaw community is rethinking how safety instructions work.&lt;/p&gt;

&lt;p&gt;Key takeaways: hard approval gates, remote kill switches, and never trusting prompt-level instructions alone.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-agent-inbox-deletion-meta" rel="noopener noreferrer"&gt;https://clawhosters.com/blog/posts/openclaw-agent-inbox-deletion-meta&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Cisco Calls OpenClaw an Absolute Security Nightmare: What You Need to Know</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Mon, 20 Apr 2026 07:12:22 +0000</pubDate>
      <link>https://forem.com/yixn_io/cisco-calls-openclaw-an-absolute-security-nightmare-what-you-need-to-know-2ppc</link>
      <guid>https://forem.com/yixn_io/cisco-calls-openclaw-an-absolute-security-nightmare-what-you-need-to-know-2ppc</guid>
      <description>&lt;p&gt;Cisco's AI Threat and Security Research team released a critical security assessment of OpenClaw on January 28, characterizing it as "an absolute nightmare from a security perspective." Despite calling it a "dream for busy professionals," researchers Amy Chang, Vineeth Sai Narajala, and Idan Habler identified four primary attack surfaces that self-hosters need to take seriously.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Four Threat Vectors
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Shell command execution&lt;/strong&gt; through agent prompts&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File system access&lt;/strong&gt; without proper sandboxing&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;API key leakage via prompt injection&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Messaging app integrations&lt;/strong&gt; (WhatsApp, iMessage) as attack vectors&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The fundamental issue: OpenClaw's local deployment model assumes a trusted environment. When exposed to the internet without hardening, that trust model breaks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Skill Scanner Results
&lt;/h2&gt;

&lt;p&gt;Cisco built an open-source Skill Scanner and tested 31,000 ClawHub skills. &lt;strong&gt;26% contained at least one vulnerability.&lt;/strong&gt; A test skill called "What Would Elon Do?" silently exfiltrated user data, triggering 9 findings including 2 critical.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Picture
&lt;/h2&gt;

&lt;p&gt;This report dropped alongside multiple threats:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-25253&lt;/strong&gt;: Critical one-click RCE (CVSS 8.8), patched in v2026.1.29&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ClawHavoc Campaign&lt;/strong&gt;: 341 malicious skills found in ClawHub deploying Atomic macOS Stealer&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;42,665 exposed instances&lt;/strong&gt; discovered by researcher Maor Dayan, 93.4% with bypassed authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What to Do About It
&lt;/h2&gt;

&lt;p&gt;If you're self-hosting OpenClaw:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable authentication (seriously, 93% of exposed instances didn't)&lt;/li&gt;
&lt;li&gt;Isolate your network&lt;/li&gt;
&lt;li&gt;Update regularly&lt;/li&gt;
&lt;li&gt;Audit your installed skills&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Or use a managed host that handles isolation, auth enforcement, and hourly patching for you.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published on &lt;a href="https://clawhosters.com/blog/posts/cisco-openclaw-security-nightmare" rel="noopener noreferrer"&gt;ClawHosters Blog&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>docker</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>Jentic Mini: Free API Security Layer for OpenClaw Agents</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 19 Apr 2026 07:13:57 +0000</pubDate>
      <link>https://forem.com/yixn_io/jentic-mini-free-api-security-layer-for-openclaw-agents-7da</link>
      <guid>https://forem.com/yixn_io/jentic-mini-free-api-security-layer-for-openclaw-agents-7da</guid>
      <description>&lt;p&gt;Dublin-based Jentic released Jentic Mini on March 25, 2026. A free, open-source API execution layer that sits between OpenClaw agents and external APIs.&lt;/p&gt;

&lt;p&gt;The problem it solves: when your OpenClaw agent calls Stripe, Slack, or Notion, those credentials typically live inside the agent context. Jentic Mini moves them into an encrypted vault on your infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;p&gt;Jentic Mini runs as a single Docker container (FastAPI + SQLite). No cloud dependency. The catalog covers about 1,044 OpenAPI specs and roughly 380 Arazzo workflow sources, totaling 10,000+ API endpoints.&lt;/p&gt;

&lt;p&gt;Key features:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Encrypted credential vault&lt;/strong&gt; on your own infrastructure&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Toolkit-scoped permissions&lt;/strong&gt; so agents only access the APIs they need&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kill switch&lt;/strong&gt; to instantly revoke all API access&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Apache 2.0&lt;/strong&gt; license, no usage restrictions&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Setup
&lt;/h2&gt;

&lt;p&gt;Deploy alongside any OpenClaw instance via Docker Compose. Works with both self-hosted and managed providers like ClawHosters. Minimal configuration overhead.&lt;/p&gt;

&lt;p&gt;Jentic secured $4.5M in pre-seed funding and became the first Irish company admitted to the AWS GenAI Accelerator program.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/jentic-mini-openclaw-api-security" rel="noopener noreferrer"&gt;Full article on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>api</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Trend Micro Launches TrendAI Governance Gateway for OpenClaw Agents</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 19 Apr 2026 07:13:37 +0000</pubDate>
      <link>https://forem.com/yixn_io/trend-micro-launches-trendai-governance-gateway-for-openclaw-agents-2652</link>
      <guid>https://forem.com/yixn_io/trend-micro-launches-trendai-governance-gateway-for-openclaw-agents-2652</guid>
      <description>&lt;p&gt;Trend Micro announced the TrendAI Agentic Governance Gateway at RSAC 2026, a platform designed to give enterprises visibility and control over autonomous AI agent operations.&lt;/p&gt;

&lt;h2&gt;
  
  
  What It Does
&lt;/h2&gt;

&lt;p&gt;The governance platform monitors four areas:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time observation of agent interactions across systems&lt;/li&gt;
&lt;li&gt;Context and intent analysis to identify risky actions&lt;/li&gt;
&lt;li&gt;Policy enforcement that blocks operations before execution&lt;/li&gt;
&lt;li&gt;Human oversight insertion at critical decision points&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A standout feature is pre-deployment simulation. Teams can test governance policies in non-production environments before going live.&lt;/p&gt;

&lt;p&gt;The solution integrates with Trend Micro's Vision One platform. CEO Eva Chen framed it directly: "As AI systems become more autonomous, security must evolve from protection to governance."&lt;/p&gt;

&lt;h2&gt;
  
  
  Where It Fits
&lt;/h2&gt;

&lt;p&gt;The OpenClaw security ecosystem now has multiple layers. Cisco DefenseClaw handles scanning and sandboxing. Gen's Agent Trust Hub addresses consumer trust verification. NVIDIA NemoClaw provides infrastructure guardrails. Trend Micro adds governance and policy enforcement on top.&lt;/p&gt;

&lt;p&gt;The agentic AI market is projected to reach $139 billion by 2034, growing at 40.5% annually.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical Impact
&lt;/h2&gt;

&lt;p&gt;Managed hosting providers like ClawHosters handle infrastructure-level security separately. TrendAI targets the governance layer above that, particularly for enterprises running dozens of agents with real business authority (purchase approvals, database modifications, etc.).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/trendai-openclaw-governance-gateway" rel="noopener noreferrer"&gt;Full article on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>ai</category>
      <category>enterprise</category>
    </item>
    <item>
      <title>OpenClaw v2026.3.28: xAI Grok Gets Web Search, MiniMax Brings Image Generation</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 19 Apr 2026 07:13:21 +0000</pubDate>
      <link>https://forem.com/yixn_io/openclaw-v2026328-xai-grok-gets-web-search-minimax-brings-image-generation-16j2</link>
      <guid>https://forem.com/yixn_io/openclaw-v2026328-xai-grok-gets-web-search-minimax-brings-image-generation-16j2</guid>
      <description>&lt;p&gt;OpenClaw v2026.3.28 shipped with three notable changes.&lt;/p&gt;

&lt;h2&gt;
  
  
  xAI Grok Web Search
&lt;/h2&gt;

&lt;p&gt;The bundled xAI provider moved to the Responses API, which enables native x_search support. Your OpenClaw agent can now browse the web through Grok's own search infrastructure. Existing xAI configs get automatic plugin activation. New installs can set it up via &lt;code&gt;openclaw configure --section web&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The Web Search Key Audit also expanded to recognize credentials for Gemini, Grok/xAI, Kimi, Moonshot, and OpenRouter.&lt;/p&gt;

&lt;h2&gt;
  
  
  MiniMax Image Generation
&lt;/h2&gt;

&lt;p&gt;MiniMax joined as a second image generation provider alongside DALL-E, using their image-01 model. Supports text-to-image and image-to-image editing with aspect ratio controls. Setup takes about two minutes via &lt;code&gt;openclaw configure --section image&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Config Doctor Gets Stricter
&lt;/h2&gt;

&lt;p&gt;Legacy configuration migrations older than two months now fail validation instead of silently rewriting old config keys. Self-hosted users need to run &lt;code&gt;openclaw doctor --fix&lt;/code&gt; before upgrading. Managed instances (like ClawHosters) handle this automatically.&lt;/p&gt;

&lt;p&gt;Also in this release: Qwen deprecated its qwen-portal-auth OAuth path and migrated to Model Studio, and the legacy Chrome extension relay for Browser Chrome MCP was removed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-v2026-3-28-xai-grok-minimax" rel="noopener noreferrer"&gt;Read the full breakdown on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>ai</category>
      <category>webdev</category>
      <category>opensource</category>
    </item>
    <item>
      <title>300+ Trojanized GitHub Packages Target OpenClaw Docker Users</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sat, 18 Apr 2026 07:11:28 +0000</pubDate>
      <link>https://forem.com/yixn_io/300-trojanized-github-packages-target-openclaw-docker-users-5an2</link>
      <guid>https://forem.com/yixn_io/300-trojanized-github-packages-target-openclaw-docker-users-5an2</guid>
      <description>&lt;p&gt;Over 300 malicious GitHub packages masquerading as OpenClaw Docker deployment tools were discovered distributing a LuaJIT-based Trojan. The malware steals credentials, captures screenshots, and sends everything to command-and-control servers in Frankfurt.&lt;/p&gt;

&lt;p&gt;Netskope Threat Labs found the campaign in March 2026. The packages looked legitimate with spoofed names, READMEs, and star counts. They specifically targeted people searching for OpenClaw Docker setup guides.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the malware does
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Captures stored credentials from browsers and password managers&lt;/li&gt;
&lt;li&gt;Takes periodic screenshots of victim machines&lt;/li&gt;
&lt;li&gt;Exfiltrates API keys and tokens from environment variables&lt;/li&gt;
&lt;li&gt;Maintains persistence through cron jobs and systemd services&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to protect yourself
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Only install packages from the official OpenClaw repository&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Verify package authors&lt;/strong&gt; before running install commands&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pin your Docker image digests&lt;/strong&gt; instead of using ":latest"&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit your existing packages&lt;/strong&gt; for anything you don't recognize&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you're not confident in your Docker security setup, managed hosting eliminates the supply chain risk entirely. Services like &lt;a href="https://clawhosters.com" rel="noopener noreferrer"&gt;ClawHosters&lt;/a&gt; handle the infrastructure so you don't have to vet every dependency yourself.&lt;/p&gt;

&lt;p&gt;Full breakdown with IOCs and detection rules: &lt;a href="https://clawhosters.com/blog/posts/openclaw-trojanized-github-packages-2026" rel="noopener noreferrer"&gt;Read the full article&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>docker</category>
      <category>security</category>
      <category>devops</category>
    </item>
    <item>
      <title>OpenClaw Docker Hardening: 6 Steps to Lock Down Your AI Agent Container</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate>
      <link>https://forem.com/yixn_io/openclaw-docker-hardening-6-steps-to-lock-down-your-ai-agent-container-32na</link>
      <guid>https://forem.com/yixn_io/openclaw-docker-hardening-6-steps-to-lock-down-your-ai-agent-container-32na</guid>
      <description>&lt;p&gt;SecurityScorecard recently identified 40,214 exposed OpenClaw instances in the wild. 63% of them are vulnerable, and 12,812 can be exploited via remote code execution. CVE-2026-25253 (CVSS 8.8) lets an attacker extract API keys in 30 seconds through WebSocket manipulation.&lt;/p&gt;

&lt;p&gt;58% of OpenClaw containers still run as root with default capabilities.&lt;/p&gt;

&lt;p&gt;I put together a practical hardening guide that covers 6 areas:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Running containers as non-root with dropped capabilities&lt;/li&gt;
&lt;li&gt;Read-only filesystem with targeted tmpfs mounts&lt;/li&gt;
&lt;li&gt;Image pinning to SHA256 digests (not &lt;code&gt;latest&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Network isolation with internal bridge networks&lt;/li&gt;
&lt;li&gt;Tool and workspace restrictions (blocking &lt;code&gt;system.run&lt;/code&gt;, denying sensitive paths)&lt;/li&gt;
&lt;li&gt;CPU and memory resource limits&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each section includes the actual Docker Compose config you need. No theory, just copy-paste hardening.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-docker-security-hardening" rel="noopener noreferrer"&gt;Read the full guide on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>docker</category>
      <category>security</category>
      <category>ai</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>CrowdStrike Calls OpenClaw 'AI Super Agent', Publishes 156 Security Advisories</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 03 Apr 2026 07:02:25 +0000</pubDate>
      <link>https://forem.com/yixn_io/crowdstrike-calls-openclaw-ai-super-agent-publishes-156-security-advisories-3lb9</link>
      <guid>https://forem.com/yixn_io/crowdstrike-calls-openclaw-ai-super-agent-publishes-156-security-advisories-3lb9</guid>
      <description>&lt;p&gt;CrowdStrike's CTO Elia Zaitsev just published what might be the most thorough security breakdown of OpenClaw to date. They're not treating it as a chatbot. They're treating it as an autonomous system with real access to real infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Numbers
&lt;/h2&gt;

&lt;p&gt;156 total security advisories. 28 with CVE IDs assigned, 128 still awaiting assignment.&lt;/p&gt;

&lt;p&gt;Severity breakdown: 4 Critical, 52 High, 88 Medium, 12 Low. That's 56 advisories rated High or Critical.&lt;/p&gt;

&lt;h2&gt;
  
  
  Four Attack Vectors
&lt;/h2&gt;

&lt;p&gt;CrowdStrike identified:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Direct prompt injection&lt;/strong&gt; where attackers feed malicious instructions to the agent&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Indirect prompt injection&lt;/strong&gt; through contaminated data sources&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Agentic tool chain attacks&lt;/strong&gt; exploiting how OpenClaw connects to external systems&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AI tool poisoning&lt;/strong&gt; targeting plugins and skills&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As Zaitsev put it: "AI agents don't just generate answers, they can take action; operating with speed, autonomy, and privileged access to email, calendars, sensitive data, credentials, and third-party systems."&lt;/p&gt;

&lt;h2&gt;
  
  
  The Scale Problem
&lt;/h2&gt;

&lt;p&gt;Censys found 21,639 publicly accessible OpenClaw instances. Most probably running without dedicated security monitoring or regular patching.&lt;/p&gt;

&lt;p&gt;CrowdStrike also demoed their Falcon AIDR blocking a live Discord exfiltration attack targeting an OpenClaw instance. These aren't theoretical risks.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Means
&lt;/h2&gt;

&lt;p&gt;If you're running OpenClaw on a VPS you set up months ago, 56 High/Critical advisories should make you uncomfortable. Self-hosted AI without professional security management is becoming a liability.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/crowdstrike-openclaw-security-assessment" rel="noopener noreferrer"&gt;Full breakdown&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Managed hosting like &lt;a href="https://clawhosters.com" rel="noopener noreferrer"&gt;ClawHosters&lt;/a&gt; applies auto-patching, credential isolation, and monitoring as standard. The kinds of protections CrowdStrike recommends, applied automatically.&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>crowdstrike</category>
      <category>infosec</category>
    </item>
    <item>
      <title>OpenClaw RAG Knowledge Base: Turn Your AI Agent Into a Document Search Engine</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 03 Apr 2026 07:02:25 +0000</pubDate>
      <link>https://forem.com/yixn_io/openclaw-rag-knowledge-base-turn-your-ai-agent-into-a-document-search-engine-4ij1</link>
      <guid>https://forem.com/yixn_io/openclaw-rag-knowledge-base-turn-your-ai-agent-into-a-document-search-engine-4ij1</guid>
      <description>&lt;p&gt;Most AI agents are smart but uninformed. They know the internet. They don't know your company's return policy, your internal API docs, or what your team decided in last Tuesday's meeting.&lt;/p&gt;

&lt;p&gt;OpenClaw ships with a built-in knowledge skill that fixes this. Feed it files, and it answers questions by pulling relevant chunks and citing where it found them.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;p&gt;Drop documents into a &lt;code&gt;knowledge/&lt;/code&gt; folder in your workspace. Supported formats: &lt;code&gt;.md&lt;/code&gt;, &lt;code&gt;.txt&lt;/code&gt;, &lt;code&gt;.pdf&lt;/code&gt;, &lt;code&gt;.csv&lt;/code&gt;, &lt;code&gt;.json&lt;/code&gt;. The agent indexes them locally. No external vector database. No embeddings API key to configure.&lt;/p&gt;

&lt;p&gt;Then ask questions:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;You:&lt;/strong&gt; What's the SLA for critical bugs?&lt;br&gt;
&lt;strong&gt;Agent:&lt;/strong&gt; Per your support-tiers.md (lines 45-52), critical bugs have a 4-hour response SLA on the Enterprise plan and 24-hour resolution target.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The &lt;code&gt;citeSources: true&lt;/code&gt; flag makes the agent reference exact file and location. For internal knowledge bases, citations are what make people trust the output.&lt;/p&gt;

&lt;h2&gt;
  
  
  What to Feed It
&lt;/h2&gt;

&lt;p&gt;Good candidates: product docs, API references, FAQ lists, meeting notes with decisions, Obsidian/Notion exports, HR policies, pricing sheets.&lt;/p&gt;

&lt;p&gt;Bad candidates: raw chat logs, uncleaned video transcripts, massive database dumps.&lt;/p&gt;

&lt;p&gt;Practical tip: break large documents into topic-focused files. 40 Markdown files beat one 200-page PDF every time.&lt;/p&gt;

&lt;h2&gt;
  
  
  Config
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"skills"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"knowledge"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"enabled"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"workspacePath"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"./knowledge"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"chunkSize"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;512&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"chunkOverlap"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;64&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"citeSources"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-rag-knowledge-base-tutorial" rel="noopener noreferrer"&gt;Full tutorial with examples&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you want this running in 2 minutes without managing infrastructure, &lt;a href="https://clawhosters.com" rel="noopener noreferrer"&gt;ClawHosters&lt;/a&gt; handles the indexing, backups, and updates automatically.&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>rag</category>
      <category>ai</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>7 Critical CVEs Hit OpenClaw's Nextcloud Talk Plugin</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Thu, 02 Apr 2026 08:07:01 +0000</pubDate>
      <link>https://forem.com/yixn_io/7-critical-cves-hit-openclaws-nextcloud-talk-plugin-221o</link>
      <guid>https://forem.com/yixn_io/7-critical-cves-hit-openclaws-nextcloud-talk-plugin-221o</guid>
      <description>&lt;p&gt;Seven critical vulnerabilities. All published on the same day. All scoring above 9.0 on the CVSS scale. Belgium's national cybersecurity authority told organizations to patch immediately.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Headline Bug
&lt;/h2&gt;

&lt;p&gt;CVE-2026-28474 (CVSS 9.8): OpenClaw lets you restrict which users can talk to your AI agent through an allowlist. But the Nextcloud Talk plugin was checking the user's &lt;strong&gt;display name&lt;/strong&gt; instead of their actual user ID. An attacker changes their Nextcloud display name to match someone on the allowlist. Done. They're in.&lt;/p&gt;

&lt;p&gt;No authentication bypass needed. No special privileges. No user interaction.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Full CVE List
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;CVSS 4.0&lt;/th&gt;
&lt;th&gt;Component&lt;/th&gt;
&lt;th&gt;Fixed In&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;CVE-2026-28474&lt;/td&gt;
&lt;td&gt;9.3&lt;/td&gt;
&lt;td&gt;Talk Plugin&lt;/td&gt;
&lt;td&gt;2026.2.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CVE-2026-28466&lt;/td&gt;
&lt;td&gt;9.4&lt;/td&gt;
&lt;td&gt;Gateway&lt;/td&gt;
&lt;td&gt;2026.2.14&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CVE-2026-28391&lt;/td&gt;
&lt;td&gt;9.2&lt;/td&gt;
&lt;td&gt;Talk Plugin&lt;/td&gt;
&lt;td&gt;2026.2.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CVE-2026-28446&lt;/td&gt;
&lt;td&gt;9.2&lt;/td&gt;
&lt;td&gt;Talk Plugin&lt;/td&gt;
&lt;td&gt;2026.2.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CVE-2026-28470&lt;/td&gt;
&lt;td&gt;9.2&lt;/td&gt;
&lt;td&gt;Talk Plugin&lt;/td&gt;
&lt;td&gt;2026.2.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CVE-2026-28472&lt;/td&gt;
&lt;td&gt;9.2&lt;/td&gt;
&lt;td&gt;Gateway&lt;/td&gt;
&lt;td&gt;2026.2.6&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Two Patch Targets
&lt;/h2&gt;

&lt;p&gt;Most CVEs target the Nextcloud Talk plugin (fixed in 2026.2.6). But CVE-2026-28466 hits the &lt;strong&gt;core OpenClaw gateway&lt;/strong&gt; and needs a separate upgrade to 2026.2.14. Patching only the plugin leaves you exposed.&lt;/p&gt;

&lt;p&gt;42,000+ publicly exposed OpenClaw instances found through Shodan and Censys scans. If you self-host with Nextcloud Talk enabled, update both components now.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-nextcloud-talk-cves-2026" rel="noopener noreferrer"&gt;Full breakdown&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com" rel="noopener noreferrer"&gt;ClawHosters&lt;/a&gt; managed instances are not affected. We don't use the Nextcloud Talk plugin, and auto-patching keeps every instance on the latest secure version.&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>cve</category>
      <category>nextcloud</category>
    </item>
    <item>
      <title>OpenClaw Permissions: Lock Down Your AI Agent in 60 Seconds</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Thu, 02 Apr 2026 08:06:46 +0000</pubDate>
      <link>https://forem.com/yixn_io/openclaw-permissions-lock-down-your-ai-agent-in-60-seconds-d54</link>
      <guid>https://forem.com/yixn_io/openclaw-permissions-lock-down-your-ai-agent-in-60-seconds-d54</guid>
      <description>&lt;p&gt;135,000 OpenClaw instances are exposed across 82 countries right now. 12,812 of those are exploitable via remote code execution.&lt;/p&gt;

&lt;p&gt;Your OpenClaw instance ships with almost zero security turned on. The gateway binds to loopback, which is good. But the tool access model? Wide open. Your agent can run any shell command, read any file your OS user can reach, and accept messages from anyone who finds your Telegram bot.&lt;/p&gt;

&lt;p&gt;The fix takes about 60 seconds. OpenClaw has three permission layers:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Who can message your bot&lt;/strong&gt; (dmPolicy + allowlist with numeric Telegram IDs)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Which tools the agent has&lt;/strong&gt; (tool profiles + deny lists)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shell command execution&lt;/strong&gt; (exec.security set to deny)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;One JSON file. Three settings. Done.&lt;/p&gt;

&lt;p&gt;Full walkthrough with the complete hardened config:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://clawhosters.com/blog/posts/openclaw-permissions-access-control-guide" rel="noopener noreferrer"&gt;Read the full guide&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you want these security defaults baked in from day one, &lt;a href="https://clawhosters.com" rel="noopener noreferrer"&gt;ClawHosters&lt;/a&gt; ships with container isolation, firewall rules, and auto-updates out of the box.&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>aiagents</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>Shenzhen Launches Lobster Ten Policies: First Government to Subsidize OpenClaw With Millions</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Wed, 01 Apr 2026 07:04:58 +0000</pubDate>
      <link>https://forem.com/yixn_io/shenzhen-launches-lobster-ten-policies-first-government-to-subsidize-openclaw-with-millions-34ko</link>
      <guid>https://forem.com/yixn_io/shenzhen-launches-lobster-ten-policies-first-government-to-subsidize-openclaw-with-millions-34ko</guid>
      <description>&lt;p&gt;A local government in Shenzhen just did something no government has done before. On March 7, 2026, the Longgang District released ten policies with public funding going directly to developers building on OpenClaw.&lt;/p&gt;

&lt;p&gt;The numbers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Up to 2 million yuan ($290K) for contributing core code to OpenClaw&lt;/li&gt;
&lt;li&gt;40% reimbursement on deployment costs, capped at 2 million yuan per company per year&lt;/li&gt;
&lt;li&gt;30% subsidy on API fees, up to 1 million yuan annually&lt;/li&gt;
&lt;li&gt;Seed-stage startups can receive equity investment up to 10 million yuan ($1.46M)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The concept driving this: One-Person Companies (OPC). One founder, no employees, running an entire business on OpenClaw agents.&lt;/p&gt;

&lt;p&gt;Meanwhile, Beijing banned OpenClaw from government computers the same week. China is simultaneously treating it as a national security risk and a strategic development priority.&lt;/p&gt;

&lt;p&gt;Nearly 1,000 people queued at Tencent HQ just for free OpenClaw installation help.&lt;/p&gt;

&lt;p&gt;👉 Full story: &lt;a href="https://clawhosters.com/blog/posts/shenzhen-openclaw-subsidies-lobster-ten-policies" rel="noopener noreferrer"&gt;Shenzhen Lobster Ten Policies&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>ai</category>
      <category>china</category>
      <category>policy</category>
    </item>
  </channel>
</rss>
