<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Daniel Samer</title>
    <description>The latest articles on DEV Community by Daniel Samer (@yixn_io).</description>
    <link>https://dev.to/yixn_io</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3751446%2F3472fba5-7de1-4b4c-a184-6cace86fbe71.png</url>
      <title>DEV Community: Daniel Samer</title>
      <link>https://dev.to/yixn_io</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yixn_io"/>
    <language>en</language>
    <item>
      <title>How to Deploy OpenClaw on Kubernetes with Helm Charts</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 26 Apr 2026 07:11:53 +0000</pubDate>
      <link>https://dev.to/yixn_io/how-to-deploy-openclaw-on-kubernetes-with-helm-charts-22cp</link>
      <guid>https://dev.to/yixn_io/how-to-deploy-openclaw-on-kubernetes-with-helm-charts-22cp</guid>
      <description>&lt;p&gt;OpenClaw is stateful. That single fact changes everything about how you deploy it on Kubernetes.&lt;/p&gt;

&lt;p&gt;No horizontal scaling, no RollingUpdate. You need the Recreate strategy or you get duplicate messages. NGINX ingress needs timeout annotations at 3600 seconds or WebSocket connections drop after 60s.&lt;/p&gt;

&lt;p&gt;The guide compares three production-ready Helm charts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;serhanekicii/openclaw-helm&lt;/strong&gt; (most hardened, security defaults baked in)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Chrisbattarbee/openclaw-helm&lt;/strong&gt; (simpler, faster setup)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;openclaw-rocks/k8s-operator&lt;/strong&gt; (multi-tenant deployments)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Honest cost breakdown: managed K8s clusters run $79-152/mo. k3s on a VPS gets you to $15-25/mo. Or skip the ops entirely with managed hosting at €19/mo.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/deploy-openclaw-kubernetes-helm" rel="noopener noreferrer"&gt;Read the full guide&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>kubernetes</category>
      <category>devops</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>AWS Adds OpenClaw Blueprint to Amazon Lightsail With Bedrock Integration</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 26 Apr 2026 07:11:35 +0000</pubDate>
      <link>https://dev.to/yixn_io/aws-adds-openclaw-blueprint-to-amazon-lightsail-with-bedrock-integration-10mf</link>
      <guid>https://dev.to/yixn_io/aws-adds-openclaw-blueprint-to-amazon-lightsail-with-bedrock-integration-10mf</guid>
      <description>&lt;p&gt;AWS launched OpenClaw as a pre-built blueprint on Amazon Lightsail, pre-configured with Amazon Bedrock and Claude Sonnet 4.6. Available across 15 regions at $5-$24/month.&lt;/p&gt;

&lt;p&gt;The recommended plan ($24/mo) gets you 4GB RAM, 2 vCPUs, and 80GB SSD with auto-HTTPS. But you still own security patching, firewall config, backups, and monitoring.&lt;/p&gt;

&lt;p&gt;This follows DigitalOcean's February launch by about three weeks. The cloud providers are clearly betting on OpenClaw adoption.&lt;/p&gt;

&lt;p&gt;Full breakdown on the ClawHosters blog:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-lightsail-aws-bedrock-hosting" rel="noopener noreferrer"&gt;Read the full article&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>aws</category>
      <category>cloud</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>How to Deploy OpenClaw on Kubernetes with Helm Charts</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sat, 25 Apr 2026 13:00:00 +0000</pubDate>
      <link>https://dev.to/yixn_io/how-to-deploy-openclaw-on-kubernetes-with-helm-charts-50ip</link>
      <guid>https://dev.to/yixn_io/how-to-deploy-openclaw-on-kubernetes-with-helm-charts-50ip</guid>
      <description>&lt;p&gt;OpenClaw hit 250K GitHub stars, and naturally everyone wants to run it on Kubernetes. Makes sense. But there is a catch most guides skip: OpenClaw is a stateful, single-instance application. Run two replicas and you get duplicate bot messages, broken WebSocket connections, and corrupted state.&lt;/p&gt;

&lt;p&gt;I compared three Helm chart options and broke down what actually matters: security defaults (93.4% of exposed instances had auth bypass), WebSocket timeout configs that silently break after 60 seconds, and real cost numbers (EKS at $152/mo vs k3s on a VPS for $15/mo).&lt;/p&gt;

&lt;p&gt;If you are running OpenClaw for a small team, Kubernetes is probably overkill. Docker Compose or managed hosting gets you there faster. But if your org requires K8s, this guide covers the pitfalls.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/deploy-openclaw-kubernetes-helm" rel="noopener noreferrer"&gt;https://clawhosters.com/blog/posts/deploy-openclaw-kubernetes-helm&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>NanoClaw: 7,000 Stars in a Week for This Security-First OpenClaw Alternative</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 24 Apr 2026 14:30:00 +0000</pubDate>
      <link>https://dev.to/yixn_io/nanoclaw-7000-stars-in-a-week-for-this-security-first-openclaw-alternative-2cb</link>
      <guid>https://dev.to/yixn_io/nanoclaw-7000-stars-in-a-week-for-this-security-first-openclaw-alternative-2cb</guid>
      <description>&lt;p&gt;NanoClaw hit 7,000 GitHub stars in its first week. The project, built by former Wix engineer Gavriel Cohen, reimplements core OpenClaw functionality in 3,900 lines of code (compared to OpenClaw's 434,000).&lt;/p&gt;

&lt;p&gt;The key difference: OS-level container isolation for every agent. No shared filesystem, no shared processes.&lt;/p&gt;

&lt;p&gt;For developers who want AI agent capabilities without the security surface area of a full OpenClaw installation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/nanoclaw-openclaw-alternative-security" rel="noopener noreferrer"&gt;https://clawhosters.com/blog/posts/nanoclaw-openclaw-alternative-security&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>KiloClaw Launches Managed OpenClaw Hosting, Backed by 1.4M VS Code Users</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 24 Apr 2026 11:30:00 +0000</pubDate>
      <link>https://dev.to/yixn_io/kiloclaw-launches-managed-openclaw-hosting-backed-by-14m-vs-code-users-3ccn</link>
      <guid>https://dev.to/yixn_io/kiloclaw-launches-managed-openclaw-hosting-backed-by-14m-vs-code-users-3ccn</guid>
      <description>&lt;p&gt;Kilo Code, the VS Code extension with 1.4M users, launched KiloClaw: managed OpenClaw hosting with sub-60-second deployment.&lt;/p&gt;

&lt;p&gt;3,500 developers joined the waitlist. The service offers 500+ AI models via Kilo Gateway, a 7-day free trial, and direct IDE integration.&lt;/p&gt;

&lt;p&gt;That brings the managed OpenClaw hosting market to 35+ providers. The space went from niche hobby to legitimate infrastructure category in three months.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/kiloclaw-managed-openclaw-hosting" rel="noopener noreferrer"&gt;https://clawhosters.com/blog/posts/kiloclaw-managed-openclaw-hosting&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Meta AI Safety Director's OpenClaw Agent Deletes Her Entire Inbox on Camera</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 24 Apr 2026 09:30:00 +0000</pubDate>
      <link>https://dev.to/yixn_io/meta-ai-safety-directors-openclaw-agent-deletes-her-entire-inbox-on-camera-3mnj</link>
      <guid>https://dev.to/yixn_io/meta-ai-safety-directors-openclaw-agent-deletes-her-entire-inbox-on-camera-3mnj</guid>
      <description>&lt;p&gt;Summer Yue, Meta's AI Safety Director, demonstrated her OpenClaw email management agent on stream. It worked perfectly in testing. Then on a real inbox with 200+ emails, the agent's safety instruction ("ask for confirmation before deleting") got silently dropped during context window compaction. The agent deleted everything.&lt;/p&gt;

&lt;p&gt;9.6M views on X later, the OpenClaw community is rethinking how safety instructions work.&lt;/p&gt;

&lt;p&gt;Key takeaways: hard approval gates, remote kill switches, and never trusting prompt-level instructions alone.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-agent-inbox-deletion-meta" rel="noopener noreferrer"&gt;https://clawhosters.com/blog/posts/openclaw-agent-inbox-deletion-meta&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Cisco Calls OpenClaw an Absolute Security Nightmare: What You Need to Know</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Mon, 20 Apr 2026 07:12:22 +0000</pubDate>
      <link>https://dev.to/yixn_io/cisco-calls-openclaw-an-absolute-security-nightmare-what-you-need-to-know-2ppc</link>
      <guid>https://dev.to/yixn_io/cisco-calls-openclaw-an-absolute-security-nightmare-what-you-need-to-know-2ppc</guid>
      <description>&lt;p&gt;Cisco's AI Threat and Security Research team released a critical security assessment of OpenClaw on January 28, characterizing it as "an absolute nightmare from a security perspective." Despite calling it a "dream for busy professionals," researchers Amy Chang, Vineeth Sai Narajala, and Idan Habler identified four primary attack surfaces that self-hosters need to take seriously.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Four Threat Vectors
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Shell command execution&lt;/strong&gt; through agent prompts&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File system access&lt;/strong&gt; without proper sandboxing&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;API key leakage via prompt injection&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Messaging app integrations&lt;/strong&gt; (WhatsApp, iMessage) as attack vectors&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The fundamental issue: OpenClaw's local deployment model assumes a trusted environment. When exposed to the internet without hardening, that trust model breaks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Skill Scanner Results
&lt;/h2&gt;

&lt;p&gt;Cisco built an open-source Skill Scanner and tested 31,000 ClawHub skills. &lt;strong&gt;26% contained at least one vulnerability.&lt;/strong&gt; A test skill called "What Would Elon Do?" silently exfiltrated user data, triggering 9 findings including 2 critical.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Picture
&lt;/h2&gt;

&lt;p&gt;This report dropped alongside multiple threats:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-25253&lt;/strong&gt;: Critical one-click RCE (CVSS 8.8), patched in v2026.1.29&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ClawHavoc Campaign&lt;/strong&gt;: 341 malicious skills found in ClawHub deploying Atomic macOS Stealer&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;42,665 exposed instances&lt;/strong&gt; discovered by researcher Maor Dayan, 93.4% with bypassed authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What to Do About It
&lt;/h2&gt;

&lt;p&gt;If you're self-hosting OpenClaw:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable authentication (seriously, 93% of exposed instances didn't)&lt;/li&gt;
&lt;li&gt;Isolate your network&lt;/li&gt;
&lt;li&gt;Update regularly&lt;/li&gt;
&lt;li&gt;Audit your installed skills&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Or use a managed host that handles isolation, auth enforcement, and hourly patching for you.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published on &lt;a href="https://clawhosters.com/blog/posts/cisco-openclaw-security-nightmare" rel="noopener noreferrer"&gt;ClawHosters Blog&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>docker</category>
      <category>selfhosted</category>
    </item>
    <item>
      <title>Jentic Mini: Free API Security Layer for OpenClaw Agents</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 19 Apr 2026 07:13:57 +0000</pubDate>
      <link>https://dev.to/yixn_io/jentic-mini-free-api-security-layer-for-openclaw-agents-7da</link>
      <guid>https://dev.to/yixn_io/jentic-mini-free-api-security-layer-for-openclaw-agents-7da</guid>
      <description>&lt;p&gt;Dublin-based Jentic released Jentic Mini on March 25, 2026. A free, open-source API execution layer that sits between OpenClaw agents and external APIs.&lt;/p&gt;

&lt;p&gt;The problem it solves: when your OpenClaw agent calls Stripe, Slack, or Notion, those credentials typically live inside the agent context. Jentic Mini moves them into an encrypted vault on your infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;p&gt;Jentic Mini runs as a single Docker container (FastAPI + SQLite). No cloud dependency. The catalog covers about 1,044 OpenAPI specs and roughly 380 Arazzo workflow sources, totaling 10,000+ API endpoints.&lt;/p&gt;

&lt;p&gt;Key features:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Encrypted credential vault&lt;/strong&gt; on your own infrastructure&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Toolkit-scoped permissions&lt;/strong&gt; so agents only access the APIs they need&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kill switch&lt;/strong&gt; to instantly revoke all API access&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Apache 2.0&lt;/strong&gt; license, no usage restrictions&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Setup
&lt;/h2&gt;

&lt;p&gt;Deploy alongside any OpenClaw instance via Docker Compose. Works with both self-hosted and managed providers like ClawHosters. Minimal configuration overhead.&lt;/p&gt;

&lt;p&gt;Jentic secured $4.5M in pre-seed funding and became the first Irish company admitted to the AWS GenAI Accelerator program.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/jentic-mini-openclaw-api-security" rel="noopener noreferrer"&gt;Full article on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>api</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Trend Micro Launches TrendAI Governance Gateway for OpenClaw Agents</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 19 Apr 2026 07:13:37 +0000</pubDate>
      <link>https://dev.to/yixn_io/trend-micro-launches-trendai-governance-gateway-for-openclaw-agents-2652</link>
      <guid>https://dev.to/yixn_io/trend-micro-launches-trendai-governance-gateway-for-openclaw-agents-2652</guid>
      <description>&lt;p&gt;Trend Micro announced the TrendAI Agentic Governance Gateway at RSAC 2026, a platform designed to give enterprises visibility and control over autonomous AI agent operations.&lt;/p&gt;

&lt;h2&gt;
  
  
  What It Does
&lt;/h2&gt;

&lt;p&gt;The governance platform monitors four areas:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time observation of agent interactions across systems&lt;/li&gt;
&lt;li&gt;Context and intent analysis to identify risky actions&lt;/li&gt;
&lt;li&gt;Policy enforcement that blocks operations before execution&lt;/li&gt;
&lt;li&gt;Human oversight insertion at critical decision points&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A standout feature is pre-deployment simulation. Teams can test governance policies in non-production environments before going live.&lt;/p&gt;

&lt;p&gt;The solution integrates with Trend Micro's Vision One platform. CEO Eva Chen framed it directly: "As AI systems become more autonomous, security must evolve from protection to governance."&lt;/p&gt;

&lt;h2&gt;
  
  
  Where It Fits
&lt;/h2&gt;

&lt;p&gt;The OpenClaw security ecosystem now has multiple layers. Cisco DefenseClaw handles scanning and sandboxing. Gen's Agent Trust Hub addresses consumer trust verification. NVIDIA NemoClaw provides infrastructure guardrails. Trend Micro adds governance and policy enforcement on top.&lt;/p&gt;

&lt;p&gt;The agentic AI market is projected to reach $139 billion by 2034, growing at 40.5% annually.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical Impact
&lt;/h2&gt;

&lt;p&gt;Managed hosting providers like ClawHosters handle infrastructure-level security separately. TrendAI targets the governance layer above that, particularly for enterprises running dozens of agents with real business authority (purchase approvals, database modifications, etc.).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/trendai-openclaw-governance-gateway" rel="noopener noreferrer"&gt;Full article on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>security</category>
      <category>ai</category>
      <category>enterprise</category>
    </item>
    <item>
      <title>OpenClaw v2026.3.28: xAI Grok Gets Web Search, MiniMax Brings Image Generation</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sun, 19 Apr 2026 07:13:21 +0000</pubDate>
      <link>https://dev.to/yixn_io/openclaw-v2026328-xai-grok-gets-web-search-minimax-brings-image-generation-16j2</link>
      <guid>https://dev.to/yixn_io/openclaw-v2026328-xai-grok-gets-web-search-minimax-brings-image-generation-16j2</guid>
      <description>&lt;p&gt;OpenClaw v2026.3.28 shipped with three notable changes.&lt;/p&gt;

&lt;h2&gt;
  
  
  xAI Grok Web Search
&lt;/h2&gt;

&lt;p&gt;The bundled xAI provider moved to the Responses API, which enables native x_search support. Your OpenClaw agent can now browse the web through Grok's own search infrastructure. Existing xAI configs get automatic plugin activation. New installs can set it up via &lt;code&gt;openclaw configure --section web&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The Web Search Key Audit also expanded to recognize credentials for Gemini, Grok/xAI, Kimi, Moonshot, and OpenRouter.&lt;/p&gt;

&lt;h2&gt;
  
  
  MiniMax Image Generation
&lt;/h2&gt;

&lt;p&gt;MiniMax joined as a second image generation provider alongside DALL-E, using their image-01 model. Supports text-to-image and image-to-image editing with aspect ratio controls. Setup takes about two minutes via &lt;code&gt;openclaw configure --section image&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Config Doctor Gets Stricter
&lt;/h2&gt;

&lt;p&gt;Legacy configuration migrations older than two months now fail validation instead of silently rewriting old config keys. Self-hosted users need to run &lt;code&gt;openclaw doctor --fix&lt;/code&gt; before upgrading. Managed instances (like ClawHosters) handle this automatically.&lt;/p&gt;

&lt;p&gt;Also in this release: Qwen deprecated its qwen-portal-auth OAuth path and migrated to Model Studio, and the legacy Chrome extension relay for Browser Chrome MCP was removed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-v2026-3-28-xai-grok-minimax" rel="noopener noreferrer"&gt;Read the full breakdown on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>ai</category>
      <category>webdev</category>
      <category>opensource</category>
    </item>
    <item>
      <title>300+ Trojanized GitHub Packages Target OpenClaw Docker Users</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Sat, 18 Apr 2026 07:11:28 +0000</pubDate>
      <link>https://dev.to/yixn_io/300-trojanized-github-packages-target-openclaw-docker-users-5an2</link>
      <guid>https://dev.to/yixn_io/300-trojanized-github-packages-target-openclaw-docker-users-5an2</guid>
      <description>&lt;p&gt;Over 300 malicious GitHub packages masquerading as OpenClaw Docker deployment tools were discovered distributing a LuaJIT-based Trojan. The malware steals credentials, captures screenshots, and sends everything to command-and-control servers in Frankfurt.&lt;/p&gt;

&lt;p&gt;Netskope Threat Labs found the campaign in March 2026. The packages looked legitimate with spoofed names, READMEs, and star counts. They specifically targeted people searching for OpenClaw Docker setup guides.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the malware does
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Captures stored credentials from browsers and password managers&lt;/li&gt;
&lt;li&gt;Takes periodic screenshots of victim machines&lt;/li&gt;
&lt;li&gt;Exfiltrates API keys and tokens from environment variables&lt;/li&gt;
&lt;li&gt;Maintains persistence through cron jobs and systemd services&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to protect yourself
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Only install packages from the official OpenClaw repository&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Verify package authors&lt;/strong&gt; before running install commands&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pin your Docker image digests&lt;/strong&gt; instead of using ":latest"&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit your existing packages&lt;/strong&gt; for anything you don't recognize&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you're not confident in your Docker security setup, managed hosting eliminates the supply chain risk entirely. Services like &lt;a href="https://clawhosters.com" rel="noopener noreferrer"&gt;ClawHosters&lt;/a&gt; handle the infrastructure so you don't have to vet every dependency yourself.&lt;/p&gt;

&lt;p&gt;Full breakdown with IOCs and detection rules: &lt;a href="https://clawhosters.com/blog/posts/openclaw-trojanized-github-packages-2026" rel="noopener noreferrer"&gt;Read the full article&lt;/a&gt;&lt;/p&gt;

</description>
      <category>openclaw</category>
      <category>docker</category>
      <category>security</category>
      <category>devops</category>
    </item>
    <item>
      <title>OpenClaw Docker Hardening: 6 Steps to Lock Down Your AI Agent Container</title>
      <dc:creator>Daniel Samer</dc:creator>
      <pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate>
      <link>https://dev.to/yixn_io/openclaw-docker-hardening-6-steps-to-lock-down-your-ai-agent-container-32na</link>
      <guid>https://dev.to/yixn_io/openclaw-docker-hardening-6-steps-to-lock-down-your-ai-agent-container-32na</guid>
      <description>&lt;p&gt;SecurityScorecard recently identified 40,214 exposed OpenClaw instances in the wild. 63% of them are vulnerable, and 12,812 can be exploited via remote code execution. CVE-2026-25253 (CVSS 8.8) lets an attacker extract API keys in 30 seconds through WebSocket manipulation.&lt;/p&gt;

&lt;p&gt;58% of OpenClaw containers still run as root with default capabilities.&lt;/p&gt;

&lt;p&gt;I put together a practical hardening guide that covers 6 areas:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Running containers as non-root with dropped capabilities&lt;/li&gt;
&lt;li&gt;Read-only filesystem with targeted tmpfs mounts&lt;/li&gt;
&lt;li&gt;Image pinning to SHA256 digests (not &lt;code&gt;latest&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Network isolation with internal bridge networks&lt;/li&gt;
&lt;li&gt;Tool and workspace restrictions (blocking &lt;code&gt;system.run&lt;/code&gt;, denying sensitive paths)&lt;/li&gt;
&lt;li&gt;CPU and memory resource limits&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each section includes the actual Docker Compose config you need. No theory, just copy-paste hardening.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://clawhosters.com/blog/posts/openclaw-docker-security-hardening" rel="noopener noreferrer"&gt;Read the full guide on ClawHosters&lt;/a&gt;&lt;/p&gt;

</description>
      <category>docker</category>
      <category>security</category>
      <category>ai</category>
      <category>selfhosted</category>
    </item>
  </channel>
</rss>
