Security Comparison: Carapace vs. OpenClaw

In January–February 2026, security researchers disclosed a series of vulnerabilities in the OpenClaw ecosystem (Clawdbot/Moltbot) that exposed tens of thousands of personal AI assistant instances to remote exploitation. The initial disclosures were covered by The Register, Bitdefender, Cisco, SOC Prime, and Intruder, followed by a second wave from Kaspersky, Palo Alto Networks, Snyk, SecurityScorecard, and VirusTotal. The headline numbers:

Carapace is a Rust rewrite of OpenClaw built from the ground up to address these vulnerability classes. This document walks through each threat and explains how Carapace handles it.

Threat-by-Threat Comparison

1. Unauthenticated Access

How it was exploited: Researchers found hundreds of internet-facing OpenClaw instances with no authentication. Eight instances had full unauthenticated access — API keys, conversation histories, and command execution exposed to anyone. The root cause: OpenClaw defaults to open access when no credentials are configured and binds to all network interfaces.

Carapace:

2. Plaintext Secret Storage

How it was exploited: Credentials stored in plaintext JSON and Markdown files. Commodity infostealers (RedLine, Lumma, Vidar) trivially harvest API keys, OAuth tokens, and credentials from the standard OpenClaw directory structure.

Carapace:

3. Skills Supply Chain

How it was exploited: A researcher uploaded a poisoned skill to ClawHub, inflated the download count to 4,000+, and demonstrated code execution on instances in 7 countries. ClawHub had no moderation, no signing, no verification. Their own docs stated: "all code downloaded from the library will be treated as trusted code." A subsequent audit found 341 malicious skills and 7.1% of all skills leaking credentials.

Carapace:

4. Control UI Token Exfiltration (1-Click RCE)

How it was exploited (GHSA-g8p2-7wf7-98mq): OpenClaw's Control UI accepted gatewayUrl as a query parameter. A malicious link could redirect the UI to an attacker-controlled server, leaking the auth token. Combined with command execution capabilities, this was a 1-click RCE.

Carapace:

5. Prompt Injection

How it was exploited: Researcher Matvey Kukuy sent a malicious email to an OpenClaw instance. The AI read the email, treated it as legitimate instructions, and forwarded the user's last 5 emails to an attacker-controlled address. It took 5 minutes. OpenClaw ships with no guardrails by default.

Carapace:

Prompt injection remains an industry-wide unsolved problem. No AI system fully prevents it. Carapace provides defense-in-depth, not a guarantee.

6. No Process Sandboxing

How it was exploited: OpenClaw runs with full host privileges. Researchers demonstrated turning a compromised instance into a persistent backdoor for infostealers and cryptocurrency theft.

Carapace:

Caveat: Unsupported targets still fail closed for sandbox-required subprocess paths instead of running unsandboxed. On Windows, deny-network execution is supported through the *_command_output helpers; spawn_sandboxed_tokio_command intentionally rejects network_access=false and fails closed.

7. SSRF / DNS Rebinding

How it was exploited: Not explicitly reported as exploited in OpenClaw, but the skill download and outbound request surface has no URL validation or private IP blocking.

Carapace:

Summary Table

Vulnerability OpenClaw Carapace
Unauthenticated access Open by default Denied by default (fail-closed)
Exposed network ports Binds 0.0.0.0 (all interfaces) Binds 127.0.0.1 (localhost only)
Plaintext secret storage JSON/Markdown on disk OS keychains + AES-256-GCM fallback
Skills supply chain No verification, no moderation Ed25519 signatures + WASM sandbox
Control UI token exfil 1-click RCE via query param No query param override; CSRF enforced
Prompt injection No defenses Prompt guard + classifier + approval flow
Process sandboxing Full host privileges Seatbelt / Landlock / Windows AppContainer+Job / rlimits
SSRF / DNS rebinding No protections Comprehensive IP + DNS defense

Why Rust

Rust is not a silver bullet, but it significantly reduces broad memory-safety vulnerability classes:

Rust does not help with logic bugs, auth bypass, or prompt injection. Those require architecture, which is what the rest of this document covers.

Honest Caveats

Carapace ships a stable release line. The security architecture is real and tested (large automated test coverage with multi-platform CI), but some items remain partial or incomplete. Verified-vs-partial feature state is tracked in docs/feature-status.yaml and docs/feature-evidence.yaml:

We'd rather ship an honest "here's what works and what doesn't" than pretend everything is finished.

Evaluating Carapace

If you are trying to decide whether Carapace is the right fit for your setup: