Defensible Design for OpenClaw: Securing Autonomous Tool-Invoking Agents
Abstract
OpenClaw-like agents offer substantial productivity benefits, yet they are insecure by default because they combine untrusted inputs, autonomous action, extensibility, and privileged system access within a single execution loop. We use OpenClaw as an exemplar of a broader class of agents that interact with interfaces, manipulate files, invoke tools, and install extensions in real operating environments. Consequently, their security should be treated as a software engineering problem rather than as a product-specific concern. To address these architectural vulnerabilities, we propose a blueprint for defensible design. We present a risk taxonomy, secure engineering principles, and a practical research agenda to institutionalize safety in agent construction. Our goal is to transition the community focus from isolated vulnerability patching toward systematic defensive engineering and robust deployment practices.
Source: arXiv:2603.13151v1 - http://arxiv.org/abs/2603.13151v1 PDF: https://arxiv.org/pdf/2603.13151v1 Original Link: http://arxiv.org/abs/2603.13151v1