Articles

Security baseline: complete these 5 checks first

Use this checklist before exposing OpenClaw to real channels and long-running workloads.

What to do now

Complete all five checks before public rollout.

Security checklist

  1. do not expose management surfaces to uncontrolled public access
  2. update to a security-fixed stable release
  3. verify skill source and permission scope
  4. restrict file paths, commands, and external services
  5. define channel permissions and ownership

Completion standard for each check

  1. management surface:
  • only allowlisted access or private network access
  1. version updates:
  • current runtime version matches a stable release with recent fixes
  1. skill review:
  • each installed skill has source and permission notes
  1. access policy:
  • high-risk commands and paths are denied by default
  1. channel boundaries:
  • each channel has clear invoke scope and owner

SlowMist additions (high priority)

The SlowMist repository provides a more operational defense matrix. Add it to your baseline:

At minimum, add these six controls:

  1. define red-line and yellow-line command rules in AGENTS.md
  2. run full-text audits for skills (.md/.json included), not script-only checks
  3. use permission narrowing + hash baseline for core config files
  4. require nightly audit reports to list all metrics explicitly, including healthy ones
  5. add DLP checks for plaintext private keys and mnemonics
  6. run red-team validation drills after deployment

Read these when you need detail

If you only read three pieces, start with:

Optional extra reading:

Next step: return to Learn Hub and continue use-case stage.