Index
Citation·page:openclaw-matplotlib-incident-2026:fn30
OpenClaw Matplotlib Incident (2026) - Footnote 30
Verdictpartial75%
1 check · 4/29/20261 → partial
Our claim
entire recordNo record data available.
Source evidence
1 src · 1 checkpartial75%Haiku 4.5 · 4/3/2026
Noteunsupported: Security researchers found over 1,800 exposed instances leaking API keys, chat histories, and credentials. unsupported: OpenClaw trusts localhost by default with no authentication; most deployments behind reverse proxies treat all connections as trusted local traffic. wrong_attribution: Cisco's AI security team called it "groundbreaking" but "an absolute nightmare" from a security standpoint.
Case № page:openclaw-matplotlib-incident-2026:fn30Filed 4/29/2026Confidence 75%