Launch in Days, Not Weeks
Professional one-page website with limited slots available
OpenClaw collected over 145,000 GitHub stars in a matter of weeks (as of February 2026). That’s more than React picked up in its first year. The open-source AI agent went from weekend project to global phenomenon faster than any developer tool in recent memory, attracting 2 million visitors in a single week and prompting both excitement and serious security concerns.
If you’re wondering whether your SMB should pay attention—or whether OpenClaw is just the latest overhyped AI toy—here’s what you actually need to know.
OpenClaw is an autonomous AI agent that runs locally on your machine—Mac, Windows, or Linux. Unlike chatbots that answer questions, OpenClaw performs tasks. It can read and write files, execute shell commands, browse the web, control your mouse and keyboard, and integrate with messaging platforms like WhatsApp, Telegram, Discord, Slack, Teams, Signal, iMessage, and Google Chat.
The project was created by Austrian developer Peter Steinberger as a weekend experiment in late 2025, originally named “WhatsApp Relay.” It was rebranded twice—first to “Moltbot” after Anthropic raised trademark concerns, then to OpenClaw on 29 January 2026. The name changes didn’t slow adoption. By early February 2026, the project had over 145,000 stars on GitHub and 20,000 forks at the time of writing, making it one of the most talked-about developer tools of the year.
OpenClaw is open source. Your data stays on your machine. You connect it to your choice of large language model—Claude, GPT, or open-source alternatives like DeepSeek—and the agent does the rest. It maintains persistent memory across sessions, learns your preferences, and can run scheduled tasks in the background using cron jobs.
What it isn’t: a hosted service, a polished enterprise product, or something you set up with a credit card and a web form. This is developer tooling for teams comfortable with the command line and willing to configure security properly.
OpenClaw runs as a persistent local process. You install it on your machine, configure it with API credentials for your chosen large language model, and connect it to one or more messaging platforms. From that point, you interact with the agent through chat—asking it to summarise documents, automate workflows, or control software on your behalf.
The agent uses function calling to invoke tools. When you ask it to check your calendar, it doesn’t just tell you what it thinks might be there. It calls the Google Calendar API, retrieves the data, and reports back. When you ask it to file a GitHub issue, it generates the API request, executes it, and confirms the issue number.
This is enabled by the Model Context Protocol (MCP)—a standardised way for AI agents to connect to external tools and services. Before MCP, each integration required custom code. With MCP, tools expose a standard interface, and the agent learns to use them.
At the time of writing, OpenClaw supports over 50 integrations via ClawHub, its community-built skill marketplace. Think of ClawHub as an app store for agent capabilities. Developers publish skills—pre-built connections to Spotify, Gmail, GitHub, Obsidian, smart home devices, and more. You install the skills you need, and the agent gains new abilities.
In early February 2026, OpenClaw integrated VirusTotal scanning into ClawHub to detect malicious skills before users install them. Every skill is hashed, checked against VirusTotal’s database, and flagged if suspicious. Skills marked benign are auto-approved. This was a direct response to security researchers who found it trivially easy to backdoor skills and exfiltrate data.
The range of tasks OpenClaw handles depends on which skills you install and which large language models you connect. Common use cases include:
The agent maintains context across sessions. If you tell it you prefer Markdown formatting or always want emails archived after three days, it remembers. Over time, it learns patterns and suggests automations you haven’t explicitly configured.
ClawHub is to OpenClaw what an app store is to your phone. Community developers publish skills—reusable capabilities that extend what the agent can do. Over 50 integrations were available at the time of writing, covering productivity tools, communication platforms, developer utilities, and smart home devices.
Popular skills include:
Skills are installed via the OpenClaw interface. You browse the marketplace, select what you need, and the agent downloads and configures the integration. If ClawHub doesn’t have what you need, OpenClaw can write custom skills or you can build them yourself and publish them for your team.
The security model here is critical — and has already been exploited at scale. Skills run with the same permissions as the agent itself, which means a malicious skill can read your filesystem, steal API keys, or exfiltrate credentials.
This isn’t hypothetical. In the “ClawHavoc” campaign documented in early February 2026, researchers found 341 malicious skills across ClawHub’s marketplace — roughly 12% of all listed skills at the time. 335 of those delivered Atomic Stealer (AMOS), a macOS malware that harvests credentials, browser passwords, and cryptocurrency wallet data.
The attackers disguised malicious skills as legitimate tools — cryptocurrency trackers, YouTube utilities, Google Workspace integrations, and auto-updaters. One skill named “clawhub” achieved over 7,700 downloads before removal, with a renamed variant appearing the same day it was taken down. The low barrier to publishing (you only need a GitHub account older than one week) made this trivially easy to pull off.
What made these attacks particularly dangerous was the use of prompt injection — malicious instructions embedded within skill code that manipulate the AI agent’s behaviour. Palo Alto Networks described OpenClaw as a “lethal trifecta”: it has access to private data, it ingests untrusted content (skills), and it can communicate externally. This enables “time-shifted prompt injection” where a payload appears benign during installation but activates later when the agent’s context aligns with the attacker’s trigger conditions — a form of logic bomb that’s very difficult to detect through code review alone.
A separate Snyk analysis found that 7.1% of all ClawHub skills exposed sensitive credentials in plaintext — API keys, tokens, and secrets baked directly into the code.
VirusTotal scanning was added to ClawHub as a response, but it only catches known malware signatures. Novel prompt injection payloads and obfuscated scripts can still slip through. Treat every ClawHub skill as untrusted code until you’ve reviewed it yourself. Stick to skills from verified publishers with active maintenance, and audit the source before granting any skill access to your system.
OpenClaw’s viral success came with a sobering reality check. In early February 2026, security researchers found over 40,000 OpenClaw instances publicly exposed on the internet due to misconfiguration at the time of reporting. Of those, 63% were vulnerable to remote code execution attacks, allowing attackers to completely take over the host machine.
When an attacker compromises an OpenClaw instance, they gain access to everything the agent can access:
The problem wasn’t a flaw in OpenClaw itself—it was deployment mistakes. Users exposed the control panel to the public internet without authentication. They ran the agent with root permissions. They installed untrusted skills without review.
If you’re considering OpenClaw for your business, follow these precautions:
These precautions aren’t optional. OpenClaw is powerful because it has broad access. That same access becomes a liability the moment it’s misconfigured.
OpenClaw isn’t for every business. It requires technical capability to deploy safely, ongoing maintenance to keep secure, and clear use cases to justify the effort. Here’s how to decide whether it fits your team.
If OpenClaw’s security model or technical requirements don’t fit, consider these alternatives:
OpenClaw represents a meaningful shift in how AI agents work. The open-source model, local execution, and MCP integration make it genuinely different from hosted platforms. For teams with technical capability and clear use cases, it’s worth exploring.
But the security risks are real. The 40,000+ exposed instances reported in early 2026 aren’t an edge case—they’re evidence that OpenClaw’s power outpaces many users’ ability to deploy it safely. If you lack the technical depth to configure it properly, the risk outweighs the benefit.
At Fernside Studio, we help SMB teams evaluate whether OpenClaw or alternative automation approaches fit their needs. We can scope your workflows, identify the right tooling, and either deploy OpenClaw securely or build custom automation that sidesteps the complexity entirely.
If you’re considering OpenClaw for your business, talk to us first. We’ll assess whether it’s the right tool, help you deploy it safely if it is, or recommend alternatives if it isn’t. No hype, no overselling—just clear advice based on your actual requirements.
Say hello
Quick intro