7:32AI LABS
Log in to leave a comment
No posts yet
OpenClaw (formerly Clawdbot), an AI agent that modifies files on your computer and executes commands in the terminal, is currently heating up GitHub. It feels as if the era of Sovereign AI has arrived—moving beyond chatbots trapped in the prison of a browser to directly managing your own PC.
However, make no mistake. Open source does not mean free, and a local installation does not guarantee safety. Running OpenClaw without a proper firewall is like leaving your house with the front door wide open. If you don't want to face millions of won in API bills or a completely compromised system a month from now, you must face the following risks head-on.
OpenClaw exchanges significantly more data than typical chatbots. This is due to its structure, where the agent periodically sends heartbeat signals to maintain its state and re-transmits the entire conversation context to the model.
According to security industry analysis, OpenClaw's token consumption rate is 10 to 100 times higher than standard services. It is common to see cases where costs exceed $100 per month even if you just leave the automation schedule on without giving it specific tasks. Power users with high usage could end up paying thousands of dollars a month.
As conversations get longer, OpenClaw constantly references Markdown files containing its "memory and soul." As context accumulates, responses that initially took a few seconds gradually stretch into minutes. If costs are a concern, an alternative is to link Ollama to utilize local models. However, keep in mind that at least 16GB of VRAM is required to handle complex reasoning.
OpenClaw's design focuses so heavily on user convenience that it leaves security holes wide open.
The most fatal weakness is the fact that it stores user API keys and session data in JSON files without encryption. If your system is infected with malware and the file path is exposed, an attacker can enter your Anthropic or OpenAI account as if it were their own home and drain your API balance.
ClawHub, which provides extensions, has already become a target for attackers. Skills disguised as popular utilities can stealthily execute shell scripts during the installation process to leak user SSH keys or passwords stored in the browser to external servers.
Despite the clear risks, OpenClaw remains an attractive tool. To use it safely while controlling the risks, implement the following measures immediately:
Intelligence lacking security eventually becomes a weapon pointed at you. Check your installation path for data exposure right now and redeploy in an isolated environment. Technical understanding and thorough suspicion are the only ways to protect your assets and data.