High SeverityInfrastructure

Insecure Network Exposure

When your AI agent is exposed to the internet

Self-hosted AI agents are often exposed to the public internet with minimal protection, making them targets for automated scanning and attacks.

What is Network Exposure?

Insecure network exposure occurs when your AI agent is accessible from the internet without proper security controls. This is common in self-hosted deployments where convenience often trumps security.

Common scenarios include: - Running on a public IP without firewall rules - Port forwarding from home routers - Exposed Docker ports with no authentication - VPN or tunnel solutions with weak security - Development servers accidentally left public

Attackers continuously scan the internet for exposed services. AI agent endpoints are particularly valuable targets because they often have access to LLM APIs, databases, and other sensitive resources.

How Network Exposure Works

Port Scanning

Automated tools scan IP ranges looking for open ports and known service signatures.

Service Fingerprinting

Once a port is found, attackers identify what's running to find known vulnerabilities.

Shodan/Censys

Search engines that index exposed services make finding targets trivial.

Default Credential Attacks

Trying common usernames/passwords against exposed services.

Exploit Attempts

Automated tools try known exploits against identified services.

DDoS Targeting

Exposed services become targets for denial of service attacks.

Real-World Example

Security researchers demonstrated the speed of internet scanning:

1. They deployed a honeypot server with a fake AI agent endpoint 2. Within 15 minutes, the server was scanned from multiple IPs 3. Within an hour, automated credential stuffing attacks began 4. By end of day, there were hundreds of exploit attempts 5. Common attacks included prompt injection, path traversal, and known CVEs

Any exposed AI agent faces this constant barrage from day one. Without proper hardening, compromise is a matter of when, not if.

Potential Impact

Automated attacks within minutes of exposure
Credential stuffing and brute force attempts
Exploitation of known vulnerabilities
DDoS attacks disrupting availability
Reconnaissance for targeted attacks
Becoming part of a botnet

Self-Hosted Vulnerabilities

When you self-host your OpenClaw, you're responsible for addressing these risks:

Temptation to expose directly for convenience
Home network security often inadequate
Port forwarding bypasses router firewalls
Dynamic DNS reveals your home IP
No professional DDoS protection
Limited expertise in network security

How Clawctl Protects You

Clawctl includes built-in protection against network exposure:

No Direct Exposure

Your agent is never directly exposed to the internet. All access goes through our hardened gateway.

DDoS Protection

Enterprise-grade DDoS mitigation protects your agent's availability.

Web Application Firewall

WAF rules block common attacks before they reach your agent.

IP Allowlisting

Optional IP restrictions to limit access to known locations.

TLS Everywhere

All connections are encrypted with modern TLS. No plaintext traffic.

General Prevention Tips

Whether you use Clawctl or not, follow these best practices:

Never expose AI agents directly to the public internet
Use VPNs or zero-trust networks for remote access
Implement proper firewall rules
Use reverse proxies with authentication
Monitor for unauthorized access attempts
Keep all software patched and updated

Don't risk network exposure

Clawctl includes enterprise-grade protection against this threat and many others. Deploy your OpenClaw securely in 60 seconds.