OpenClaw Matplotlib Incident (2026) - Footnote 30
1 evidence check
Last checked: 4/3/2026
unsupported: Security researchers found over 1,800 exposed instances leaking API keys, chat histories, and credentials. unsupported: OpenClaw trusts localhost by default with no authentication; most deployments behind reverse proxies treat all connections as trusted local traffic. wrong_attribution: Cisco's AI security team called it "groundbreaking" but "an absolute nightmare" from a security standpoint.
Evidence — 1 source, 1 check
Note: unsupported: Security researchers found over 1,800 exposed instances leaking API keys, chat histories, and credentials. unsupported: OpenClaw trusts localhost by default with no authentication; most deployments behind reverse proxies treat all connections as trusted local traffic. wrong_attribution: Cisco's AI security team called it "groundbreaking" but "an absolute nightmare" from a security standpoint.
Debug info
Record type: citation
Record ID: page:openclaw-matplotlib-incident-2026:fn30