Collected Feb 14, 2026
Summary: A vulnerability fixed in 2026.1.20 allowed an unauthenticated local client to modify config and achieve command injection as the gateway user. NVD lists it as CVSS 8.4 with details and change history. (nvd.nist.gov)
nvd.nist.gov
Collected Feb 14, 2026
Summary: A token‑exfiltration flaw in the Control UI enabled one‑click RCE via crafted links; the fix shipped in v2026.1.29 on January 30, 2026. Guidance urges immediate upgrading and token rotation. (thehackernews.com)
thehackernews.com
Collected Feb 14, 2026
Summary: Advisory explains the unvalidated gatewayUrl parameter and confirms the fix in 2026.1.29, with CVSS 8.8 and references to upstream advisories. (advisories.gitlab.com)
advisories.gitlab.com
Collected Feb 14, 2026
Summary: The plugin (ID 297816) tracks multiple vulnerabilities and was updated to note public exploits are available, raising exposure concerns for unpatched installs. (tenable.com)
tenable.com
Collected Feb 14, 2026
Summary: STRIKE reports tens of thousands of internet‑facing deployments, with over a third flagged vulnerable, and provides a live dashboard tracking exposure trends. (securityscorecard.com)
securityscorecard.com
Collected Feb 14, 2026
Summary: Infosecurity Magazine summarizes STRIKE’s findings, noting 63% of observed deployments are vulnerable and thousands are exploitable via RCE. (infosecurity-magazine.com)
infosecurity-magazine.com
Collected Feb 14, 2026
Summary: Bitdefender highlights a rapid surge in exposed instances and frames the issue as access/identity failures around always‑on agent deployments. (bitdefender.com)
bitdefender.com
Collected Feb 14, 2026
Summary: The release hardens SSRF paths with URL allowlists and logging, locks down hook/session behavior, and delivers major scheduler stability improvements. (openclaw.report)
openclaw.report
Collected Feb 14, 2026
Summary: A roundup of 2026.2.12 details: mandatory auth for loopback browser control, auto‑generated tokens, stricter path validation, and signed Mac packages. (cybersecuritynews.com)
cybersecuritynews.com
Collected Feb 14, 2026
Summary: Latest OpenClaw image introduces randomized default service ports, one‑click public access toggles, and built‑in IM plugins, improving both security and usability. (alibabacloud.com)
alibabacloud.com
Collected Feb 14, 2026
Summary: A detailed Reddit PSA describes malicious SKILL.md submissions that exploit the skills resolver to hijack popular names, urging manual verification and safer install methods. (reddit.com)
reddit.com
Collected Feb 14, 2026
Summary: The memory/backend project aligns with OpenClaw 2026.2.9, validating custom paths and improving transcript integrity and lifecycle hooks. (clawvault.dev)
clawvault.dev
Collected Feb 14, 2026
Summary: A community proposal outlines pre/post action hooks to enable richer auditing, compliance, and analytics without modifying core code. (gist.github.com)
gist.github.com
Collected Feb 14, 2026
Summary: Report documents hundreds of malicious skills on ClawHub and early mitigation steps (publisher age requirement, reporting), warning that risks persist. (theverge.com)
theverge.com
Collected Feb 14, 2026
Summary: Follow‑up notes a VirusTotal partnership to scan third‑party skills as a partial response to the malware flood. (theverge.com)
theverge.com
Collected Feb 14, 2026
Summary: At least 230+ malicious skills impersonated crypto and utility tools to drop info‑stealers; researchers also flagged many misconfigured, exposed admin interfaces. (bleepingcomputer.com)
bleepingcomputer.com
Collected Feb 14, 2026
Summary: Coverage of late‑January uploads that used social‑engineering instructions and obfuscated commands to deliver malware from ClawHub listings. (tomshardware.com)
tomshardware.com
Collected Feb 14, 2026
Summary: Broad overview of OpenClaw’s rapid adoption and security/ethics concerns when users grant expansive permissions to an autonomous local agent. (theguardian.com)
theguardian.com
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: A hands‑on walkthrough that installs OpenClaw, connects it to Ollama for fully local LLMs, and drives the agent from Telegram end‑to‑end. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: A beginner‑friendly tutorial that deploys OpenClaw on a VPS for 24/7 availability and explains secure, practical setup choices. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: A security‑first setup guide that highlights common misconfigurations and shows safer ways to run OpenClaw and vet skills. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: Full install on a VPS plus connecting WhatsApp/Telegram and launching your first recurring automation with OpenClaw. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: Demo showing OpenClaw using “Antigravity” integrations to run free model backends and automate developer workflows. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: A real‑world demo of OpenClaw automating channel tasks like content workflows, notifications, and repeat jobs. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: Practical upgrades (VPS/Mac mini trade‑offs, cron jobs, integrations) to harden and scale an always‑on OpenClaw setup. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: News‑style rundown of the latest OpenClaw update, including easier setup, added model options, and UI tweaks—with cautions on security. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
1‑sentence description: A clear explainer of what OpenClaw is, how skills plus scheduled jobs drive real automations, and key safety considerations. (lilys.ai)
lilys.ai
▶
Collected Feb 14, 2026
VIDEO
- Dates, titles, and channels above come from each video’s metadata as surfaced by the referenced pages; all videos were uploaded between January 31 and February 9, 2026. (lilys.ai)
lilys.ai