OpenClaw Security Experts

Your OpenClaw VPS Is Probably Leaking Secrets Right Now

Most people set up OpenClaw on a Hetzner VPS and never think about security. API keys in plaintext. SSH root login wide open. Config files anyone can read. These are real issues we find in almost every setup we audit — and they can all be fixed in under an hour.

What Goes Wrong

The Mistakes Almost Everyone Makes

If you're hosting OpenClaw on a VPS and you're not a server admin, chances are your setup has at least one of these problems. They look scary, but they're all fixable — most in under 30 minutes.

Critical

API Keys in Plaintext

Your Telegram bot token, gateway auth token, and API keys are sitting in plaintext inside config files and .env.local. Anyone who gets onto your server can read them.

Critical

SSH Root Login Wide Open

PermitRootLogin is enabled by default on most VPS setups. Bots are already trying to brute-force your root password right now. It's just a matter of time.

High

World-Readable Files & Folders

Your OpenClaw config directory, .env files, and session logs are readable by any user on the system. File permissions are set to 755 or 644 when they should be locked down.

This Is What an Unsecured VPS Looks Like

A real OpenClaw user ran a security audit on their own Hetzner VPS and found: Telegram bot tokens in plaintext, gateway auth tokens exposed, .env files readable by anyone, SSH root login enabled with active brute force attempts from multiple IPs, 60+ token occurrences leaked into session logs, and backup files with all the same secrets. This wasn't a careless setup — it's just what the defaults look like. The good news? Every single issue was fixed in about 30 minutes.

Real Findings

What We Actually Find in OpenClaw Audits

These aren't hypothetical risks. These are real issues from real OpenClaw VPS setups. Your server probably has most of them right now.

CRITICAL

  • Telegram bot token exposed in plaintext in config files and backup files
  • Gateway auth token exposed in same config files (plaintext)
  • .env.local files world-readable (644 permissions, should be 600) — contains API keys
  • SSH PermitRootLogin enabled — active brute force attempts detected from external IPs

HIGH PRIORITY

  • World-readable directories — config directories at 755 permissions (should be 750)
  • Secrets found in session logs — 60+ token occurrences in session JSONL files
  • Config backups contain secrets — .bak files with same exposed tokens
  • SSH brute force activity detected — multiple failed login attempts from external IPs

All of this looks scary, but every issue can be fixed in about 30 minutes if you're patient and calm — or we can do it for you.

Our Process

What We Actually Check

No jargon, no fluff. We go through your VPS setup, find everything that's exposed, and give you clear steps to fix it — or fix it for you.

01

Secrets & Token Exposure

We scan every config file, .env file, and backup file on your VPS for exposed API keys, bot tokens, and credentials stored in plaintext. We also check your session logs — most OpenClaw setups have 60+ token occurrences leaked into JSONL log files that nobody thinks to check.

What we check: Config files, .env files, backup files, session logs, MEMORY.md

02

SSH & Access Hardening

We check if root login is disabled, if key-based authentication is enforced, and whether your server is actively being brute-forced. Most Hetzner VPS setups have multiple failed login attempts from external IPs within the first hour of going live.

What we check: SSH config, login logs, firewall rules, fail2ban setup

03

File Permissions & Directory Security

We audit every OpenClaw directory and config file for proper permissions. Your .env.local should be 600, not 644. Your OpenClaw config directory should be 750, not 755. Small numbers, big difference.

What we check: File permissions, directory permissions, ownership, umask settings

04

Backup & Log Hygiene

Config backups (.bak files) often contain the same exposed tokens as the originals. Session logs accumulate secrets over time. We identify every file that needs to be cleaned up or locked down, and show you exactly how.

What we check: Backup files, session logs, log rotation, sensitive data cleanup

What You Get After the Audit

A clear report with every issue found, severity ratings, and step-by-step instructions to fix each one. No guesswork.

Full list of every exposed secret, token, and API key on your server — with exact file paths.
SSH and access security report: root login status, brute force attempts, and recommended lockdown steps.
File permission audit showing every file and directory that's too open, with the exact commands to fix them.
Session log and backup cleanup guide to remove leaked tokens from logs and .bak files.
Step-by-step hardening guide you can follow yourself, written in plain English.
The VibeAudit Certificate — proof your OpenClaw setup has been professionally secured.
Optional hands-on remediation: we can SSH in and fix everything for you.
30-day follow-up check to make sure nothing has regressed.

Most audits are done within 1-2 business days. Book a call to get started.

FAQ

Common Questions

Everything you need to know about securing your OpenClaw setup.

Why does my OpenClaw VPS need a security audit?

When you set up OpenClaw on a VPS, the default configuration leaves a lot of things exposed — API keys in plaintext, SSH root login enabled, config files readable by anyone. These aren't edge cases, they're the default. If you're not a server admin, you probably don't know these gaps exist. We find them all and show you exactly how to fix them.

I'm not technical. Can I still fix the issues you find?

Yes. Every issue in our report comes with step-by-step instructions written in plain English. Most fixes are just one or two terminal commands. If you'd rather not touch the terminal at all, we offer hands-on remediation where we SSH into your server and fix everything for you.

How long does the audit take?

Most OpenClaw VPS audits are done within 1-2 business days. You'll get a full report with every issue categorized by severity (critical, high, medium) and clear instructions to fix each one.

What kind of issues do you typically find?

The most common ones: API keys and bot tokens stored in plaintext config files, SSH root login enabled with active brute force attempts, world-readable .env files containing secrets, tokens leaked into session log files, and backup files that contain the same exposed credentials as the originals.

Can I just ask OpenClaw to audit its own server?

You can prompt OpenClaw to run a basic security check, and it'll flag some issues. But be careful — don't let it fix things itself. If it restarts a service mid-fix, your server can go offline and not come back. Our audit is done by humans who know what they're looking at and won't brick your VPS.

How long does it take to fix everything?

About 30 minutes if you follow the steps we provide. The fixes themselves are straightforward — changing file permissions, disabling root login, moving secrets to secure locations, cleaning up log files. It just takes patience and following the steps in order.

What is the VibeAudit Certificate?

It's our seal of approval confirming your OpenClaw setup has been professionally audited and hardened. It shows your clients, team, or investors that your AI agent is running on a secured server — not just the default VPS setup.

How much does an OpenClaw audit cost?

Pricing depends on your setup — how many agents, what integrations, and whether you want us to fix things or just report them. Book a free intro call and we'll scope it out together.

Need help deploying or configuring OpenClaw? Axentia offers certified OpenClaw deployment services.