Security Check

Sandbox Mode: Contain the Blast Radius

OpenClaw supports running agent sessions inside Docker containers. With sandbox mode "all", every session gets its own isolated container. With "non-main", group sessions are sandboxed while your direct chat stays on the host.

Why It Matters

Without sandboxing, a compromised agent — whether through prompt injection or a malicious skill — has direct access to your host machine, filesystem, and credentials. Sandboxing doesn't prevent all attacks, but it dramatically limits the damage.

How to Fix

Set agents.defaults.sandbox.mode to "all" for maximum isolation. Ensure Docker is installed and the sandbox image is available.

openclaw.json
{
  "agents": {
    "defaults": {
      "sandbox": {
        "mode": "all",
        "backend": "docker",
        "scope": "session"
      }
    }
  }
}

Check your config for this vulnerability

The free scanner tests this and 11 other security checks.

Skip the hardening

Clawctl manages all 12 security checks automatically. Enterprise defaults, zero config.