Security

OpenClaw security basics: sandboxing, elevated mode, and safer defaults

Security comes up constantly in OpenClaw discussions because the product connects live messaging surfaces to real tools. The right mental model is not “perfect isolation.” It is deliberate scope, narrow trust boundaries, and copy-paste-safe defaults.

What people repeatedly need

A plain-English explanation of sandbox vs tool policy vs elevated mode.

A hardened baseline before sharing a bot in Slack, Discord, or group chats.

Clear warnings about shared workspaces, broad filesystem access, and secrets on disk.

What this hub covers

Safe baseline before convenience

Users should start with local bind, token auth, strict DM or mention rules, and a limited tool profile. Convenience features make more sense after that baseline is understood and tested.

Token Auth Pairing Mentions Minimal Tools

Sandboxing and host escape hatches

OpenClaw has three different controls that people often mix together: where tools run, which tools exist, and whether exec can escape back to the host. Good guidance should separate those decisions instead of hiding them inside one example config.

Sandbox Tool Policy Elevated Bind Mounts

Shared team risk

A shared Slack or Discord bot is not the same as a private personal assistant. Team setups need different expectations, separate runtimes, and fewer credentials. This is one of the highest-risk misunderstandings in the ecosystem.

Shared Slack Trust Boundary Per-Agent Workspace Scope

Incident response and audits

When something looks wrong, people need a short runbook: contain, rotate, audit, and verify. Security content that includes exact commands and config diff ideas is much more useful than generic warnings.

Audit Rotate Secrets Logs Recovery

Start here

  1. Keep the gateway local or tightly scoped before exposing remote surfaces.
  2. Use sandboxing for risky sessions, not as an excuse to overgrant tools.
  3. Treat shared team agents as separate trust boundaries from personal agents.
  4. Write down which secrets, files, and channels the agent is allowed to touch.