Harden your OpenClaw agent in 10 minutes. Step by step.
Paste your OpenClaw config (YAML or JSON). We scan locally — nothing leaves your browser.
Here's what we found. Fix the red items first.
Default port 18769 is a known target. Let's change it.
Pick any port between 10000-65535 that isn't 18769. Edit your config:
Your gateway token is the master key. Make it long and random:
Then set it in your config:
Your OpenClaw gateway should NEVER be exposed to the public internet.
Tailscale creates a private VPN so only your devices can reach the agent. Free for personal use.
If you can't use Tailscale, at minimum block the port from public access:
Community skills are the #1 attack vector. 15% contain malicious code.
List all skills and check each one:
Run OpenClaw in Docker with restricted permissions:
Restart OpenClaw with your new config. Your agent is now significantly harder to attack than 95% of OpenClaw instances out there.