Skip to content
Longterm Wiki
All Source Checks
Citation

OpenClaw Matplotlib Incident (2026) - Footnote 30

partial75% confidence

1 evidence check

Last checked: 4/3/2026

unsupported: Security researchers found over 1,800 exposed instances leaking API keys, chat histories, and credentials. unsupported: OpenClaw trusts localhost by default with no authentication; most deployments behind reverse proxies treat all connections as trusted local traffic. wrong_attribution: Cisco's AI security team called it "groundbreaking" but "an absolute nightmare" from a security standpoint.

Evidence — 1 source, 1 check

partial75%Haiku 4.5 · 4/3/2026
Found: Security researchers found over 1,800 exposed instances leaking API keys, chat histories, and credentials. OpenClaw trusts localhost by default with no authentication; most deployments behind reverse

Note: unsupported: Security researchers found over 1,800 exposed instances leaking API keys, chat histories, and credentials. unsupported: OpenClaw trusts localhost by default with no authentication; most deployments behind reverse proxies treat all connections as trusted local traffic. wrong_attribution: Cisco's AI security team called it "groundbreaking" but "an absolute nightmare" from a security standpoint.

Debug info

Record type: citation

Record ID: page:openclaw-matplotlib-incident-2026:fn30