OpenClaw Security Controls Beyond NemoClaw's Scope
NemoClaw provides infrastructure-layer security through sandbox isolation, network policy, filesystem restrictions, SSRF validation, and credential handling. It delegates all application-layer security to OpenClaw. This page documents areas where NemoClaw adds no independent protection beyond what OpenClaw already provides.
The details below reflect the OpenClaw documentation at the time of writing. Consult the OpenClaw Security docs for the current state.
Prompt Injection Detection and Prevention
OpenClaw detects and neutralizes prompt injection attempts before they reach the agent.
Tool Access Control and Policy Pipeline
OpenClaw enforces a multi-layer tool policy pipeline that gates every tool call.
Authentication Rate Limiting and Flood Protection
OpenClaw rate-limits authentication attempts and guards against connection floods.
Environment Variable Security Policy
OpenClaw blocks environment variables that could enable code injection, privilege escalation, or credential theft.
Security Audit Framework
OpenClaw runs automated security checks (50+ distinct check types) that cover configuration, credential handling, and sandbox posture.
Run openclaw security audit to see all findings for your deployment.
These checks include:
- Synced-folder leak detection.
- Plaintext secrets in configuration files.
- Hooks hardening verification.
- Gateway no-auth detection.
- Sandbox misconfiguration scanning.
- Weak-model susceptibility assessment.
- Multi-user exposure matrix.
- Node command policy validation.
- Dangerous config flag scanning (
allowInsecureAuth,dangerouslyDisableDeviceAuth, and similar flags).
Skill and Extension Supply Chain Scanning
OpenClaw scans skills and extensions with a built-in static analysis scanner before installation. Critical findings block installation by default.
The scanner checks for patterns including:
- Direct process execution calls.
- Dynamic code execution (
eval,new Function, and similar constructs). - Cryptocurrency mining patterns.
- Unexpected network activity.
- Potential data exfiltration (file read combined with network calls).
- Obfuscated code.
- Environment variable harvesting combined with network calls.
DM and Group Messaging Access Policy
OpenClaw controls who can interact with the agent through direct messages and group channels.
Context Visibility and Output Controls
OpenClaw restricts what supplemental context the agent can see and how it can modify outputs.
Safe Regex (ReDoS Prevention)
OpenClaw includes safe regex compilation to prevent Regular Expression Denial of Service (ReDoS) attacks. The implementation detects unsafe nested quantifiers, bounds input length, and caches results.
Next Steps
- Security Best Practices for NemoClaw’s own security controls and risk framework.
- Credential Storage for how NemoClaw stores and protects provider credentials.