Clawctl
Security
6 min

42,665 Exposed AI Agents: What the January 2026 Research Revealed

Security researchers found tens of thousands of vulnerable agent instances. 93.4% exploitable. Here's what went wrong—and what the data tells us about production AI.

Clawctl Team

Product & Engineering

42,665 Exposed AI Agents: What the January 2026 Research Revealed

In January 2026, security researcher Maor Dayan published findings that should have been a wake-up call.

42,665 exposed agent instances.

Of those, 93.4% were vulnerable to exploitation.

Not theoretical. Not "could be." Actually exploitable, sitting on the open internet.

What "Exposed" Means

These weren't honeypots or test instances. They were real deployments with:

  • Leaked API keys (Anthropic, OpenAI, AWS)
  • Conversation histories accessible via WebSocket handshake
  • Full shell access to the host
  • No authentication whatsoever

Separately, VentureBeat reported 1,800+ exposed OpenClaw instances with leaked API keys discovered in the wild.

This is what happens when localhost-first tools meet production deployment.

The Common Pattern

Almost every exposed instance followed the same pattern:

  1. Developer gets OpenClaw working locally
  2. Wants to access it remotely (from phone, from office, for teammates)
  3. Deploys on EC2/VPS with nginx reverse proxy
  4. Doesn't realize OpenClaw trusts localhost by default
  5. Every request through nginx looks like 127.0.0.1
  6. Auth bypass. Full access. Exposed.

It's not stupidity. It's the reasonable path that turns out to be wrong.

Why 93.4%?

That number is striking. Not 50%. Not 70%. Ninety-three percent.

The default configuration is unsafe for production. Out of the box:

  • Gateway binds to 0.0.0.0 (all interfaces)
  • No token auth required
  • Control UI exposed
  • Sandbox off for main sessions
  • Credentials stored in plaintext

You have to actively harden every setting. Miss one? You're in the 93.4%.

What the Research Actually Said

Maor Dayan's work showed:

  • Two instances gave up months of private conversations on WebSocket handshake alone
  • Reverse proxy localhost trust bypass was the most common vulnerability
  • Data exfiltration bypassed DLP/proxies/endpoints because agents make legitimate-looking HTTP calls
  • Persistent memory enables delayed attacks (session history as JSONL files)

Cisco's parallel research found that 26% of 31,000 agent skills contained at least one security vulnerability. The supply chain problem is real.

What Changed After January

VentureBeat published a CISO guide with 6 action items:

  1. Audit networks for exposed agents
  2. Map the lethal trifecta per agent
  3. Segment agent access
  4. Deploy skill scanning
  5. Update IR playbooks
  6. Establish guardrailed policy

Walmart's CISO called agentic AI breaches the #1 CISO challenge for 2026.

The risk isn't hypothetical anymore. It's documented, quantified, and being discussed in boardrooms.

The Question You Should Ask

If 93.4% of exposed instances were vulnerable, what's your confidence level that yours isn't?

Did you:

  • Bind to loopback only?
  • Enable token auth?
  • Disable the Control UI?
  • Encrypt credentials at rest?
  • Set up egress allowlists?
  • Enable audit logging?
  • Configure prompt injection defenses?

One miss and you're in the majority.

The Alternative

You can harden everything yourself. Some teams do. They invest 100+ hours upfront and maintain it ongoing.

Or you can deploy with secure defaults in 60 seconds and skip the list.

Either way—don't be the 93.4%.

Deploy with secure defaults →

Full security documentation →

Ready to deploy your OpenClaw securely?

Get your OpenClaw running in production with Clawctl's enterprise-grade security.