DEV Community

Darko from Kilo
Darko from Kilo

Posted on • Originally published at blog.kilo.ai

How KiloClaw Is Built to Be Secure

OpenClaw has taken the world by storm and brought autonomous AI agents into the mainstream.

However, when an agent can execute code, browse the web, and connect to Slack, Discord, or Telegram on your behalf, security stops being a footnote and starts being the whole plot.

This also raises an obvious question:

How do I know my data, accounts, and API keys are safe?

That question sits at the center of how KiloClaw is built.

KiloClaw is a managed compute platform for OpenClaw built with security at its core, and we just published a detailed white paper describing the platform's security architecture and independent assessment.

This post summarizes the key points from KiloClaw's February 2026 security white paper. Let's dive in.

What makes KiloClaw different from your "typical OpenClaw hosting SaaS"

KiloClaw was designed from the ground up with defense in depth: multiple layers of isolation, strong authentication, encrypted storage, and strict handling of customer secrets.

And in February 2026, KiloClaw brought in an independent security assessor, Andrew Storms, for a 10 day review that included threat modeling, code review, adversarial testing, and live infrastructure testing. The conclusion: KiloClaw's security architecture is sound, with tenant isolation enforced at multiple independent layers.

Each instance is an isolated virtual machine

Most SaaS products store customer data in shared infrastructure and rely on application logic to keep accounts separated.

KiloClaw is different because your AI agent actually runs code on your behalf. That means the isolation between customers has to be much stronger.

A simple way to think about it is this:

  • Many platforms give you an apartment in a larger building.

  • KiloClaw gives you your own house, on your own lot, with your own fence.

When you create a KiloClaw instance, we spin up a dedicated virtual machine just for you.

Not a shared container. Not a small slice of someone else's runtime. A full virtual machine with its own kernel.

KiloClaw uses Firecracker microVMs, the same virtualization technology used by AWS Lambda and AWS Fargate. That matters because Firecracker provides isolation between workloads based on hardware virtualization.

In practical terms, that means if something goes wrong inside your AI agent's environment, the impact is contained to your environment. There is no shared kernel, no shared filesystem, and no shared process space with other customers.

Five layers of isolation

KiloClaw does not depend on one security layer. It uses five independent layers of tenant isolation.

For one customer to access another customer's data, all five layers would have to fail at the same time.

1. Identity-based routing

Every request is authenticated before it reaches a customer machine.

KiloClaw does not route requests based on user-controlled input. Instead, it derives the destination from the authenticated user identity stored server-side.

In plain English: you cannot trick the platform into sending you to someone else's machine.

2. A dedicated application environment

Each customer's VM runs inside a dedicated Fly.io application.

That matters because KiloClaw keeps each customer's machines, storage, and internal network isolated from other customers.

In practice, that means one customer's storage cannot be attached to another customer's machine, and one customer's machines cannot be discovered through another customer's internal network.

3. Network isolation

Each customer environment is placed on its own isolated WireGuard network mesh.

During the independent assessment, live cross-tenant tests confirmed that customers could not discover one another's machines, could not connect directly across applications, and could only perform self-referencing network operations.

So the separation exists at the network layer too, not just inside the app.

4. The Firecracker VM boundary

Each customer workload runs inside its own Firecracker microVM.

This is a hard isolation boundary based on hardware virtualization. Even if an AI agent were manipulated through prompt injection or malicious tool usage, the blast radius would still be limited to that customer's own VM.

To escape that boundary would require a vulnerability in the Firecracker hypervisor itself.

5. Dedicated encrypted storage

Each customer gets a dedicated persistent storage volume, and that volume is encrypted at rest.

That storage can only be mounted inside the customer's own application environment. There is no path for another customer's machine to access it.

What about my API keys?

This is one of the most common questions for a good reason.

Customer API keys and chat tokens are encrypted in the platform database using RSA-OAEP with AES-256-GCM and are decrypted only when the customer's VM starts, where they are available inside that customer's isolated environment.

In other words, your keys are stored in encrypted form by the platform and only become readable inside your own isolated environment when needed.

There is also more work planned here over time, including short-lived token exchange and in-memory secret stores to reduce the exposure window even further.

Your data is protected in transit and while stored

KiloClaw protects data both while it is moving and while it is stored.

All external traffic uses TLS, including communication between the browser and the platform, as well as API calls to model providers.

At rest, customer storage volumes are encrypted using disk encryption at the infrastructure level, and secrets stored in the database are encrypted separately using modern cryptography.

In practical terms, that covers things like:

  • API keys

  • Chat tokens

  • Session transcripts

  • Workspace files

  • Authentication-related secrets

What happens when I delete my instance?

When you destroy your KiloClaw instance, the platform runs a two-phase cleanup process designed to complete safely even if something fails midway.

First, it shuts down and destroys the virtual machine. Then it deletes the storage volume and removes runtime secrets.

Deleting the volume also destroys the underlying encryption keys, making the stored data unrecoverable.

The deletion flow was reviewed independently and confirmed to clean up sensitive data reliably, even if part of the process fails temporarily and has to retry.

No secrets persist after instance destruction.

Some metadata that is not sensitive, such as user identifiers or timestamps needed for operational auditing, may remain in records or logs that have been soft deleted. That is standard practice and separate from customer secrets or workspace data.

What about prompt injection?

If you follow AI security, you have probably heard of prompt injection: a malicious message or webpage tries to trick an AI agent into doing something it should not do.

KiloClaw addresses this in two important ways.

First, the agent's exec tool, the capability that lets it run shell commands, requires explicit user approval before execution by default. That setting is enforced by the platform itself and cannot be overridden by the agent, by prompt injection, or through a connected chat channel.

Second, even in a worst-case scenario where prompt injection changes the agent's behavior, the blast radius is still contained to your own VM. It cannot access another customer's resources or move sideways across tenants.

Authentication is designed to reject uncertainty

KiloClaw's authentication model includes several protections that matter in practice:

  • Secure JWT cookie handling

  • Server-side session revocation

  • Constant-time secret comparison

  • Behavior that rejects requests when required systems are unavailable

That last one is especially important.

If a required backend dependency is unavailable, KiloClaw rejects the request rather than falling back to weaker behavior. That is a strong security property and one of the details security teams look for.

What we tested with an independent security assessor

In February 2026, independent assessor Andrew Storms conducted a 10-day security assessment of KiloClaw.

That work included:

  • Threat modeling using the PASTA framework, covering 30 threats across 13 assets

  • Code review of routing, authentication, secret handling, and lifecycle management

  • 35 adversarial tenant-isolation tests, including Unicode edge cases, zero-width characters, null bytes, and injection payloads

  • 8 live cross-tenant network tests across separate customer environments

  • Dozens of adversarial command-injection payloads

  • Review of the build pipeline, machine images, and runtime environment

The results were strong:

  • No cross-tenant access path was found

  • No SQL injection findings

  • No XSS findings

  • No command injection findings

  • No path traversal findings

  • No open redirect findings

The assessment also produced 17 merged pull requests: 10 security fixes and 7 hardening improvements.

Security is an ongoing practice

One thing worth saying clearly: strong security does not mean pretending the work is done.

The independent review found KiloClaw's architecture to be fundamentally sound, while also identifying areas for continued investment, especially around hardening the software supply chain and improving operational maturity.

That roadmap includes:

  • Pinning base images to SHA-256 digests

  • Image signing with Sigstore and cosign

  • SBOM generation

  • Automated vulnerability scanning in CI/CD

  • Egress monitoring and interactive approval controls for outbound agent activity

The bottom line

KiloClaw was built with the understanding that managed compute for AI agents is a product category that demands a high level of trust and security.

That is why each customer gets:

  • A dedicated virtual machine

  • A dedicated application environment

  • An isolated network

  • Dedicated encrypted storage (volume isolation)

  • Strong authentication and access controls

  • Encrypted secret handling

  • Multiple independent layers of tenant isolation

For nontechnical readers, the simplest takeaway is this:

Your agent is not running in the same place as everyone else's. Your environment is isolated by design.

For technical buyers, the important point is that this was not just claimed. It was independently reviewed, tested against adversarial scenarios, and validated in live infrastructure testing.

If you have questions about KiloClaw's security architecture or want additional documentation, reach out to the Kilo security team at security at kilocode dot ai.

Top comments (0)