Security blog FlyingPenguin dropped a report on May 7 that should worry every self-hosted OpenClaw operator. The title alone says everything: "OpenClaw is Cooked: 433 CVEs Patched by Agents That Can't Fix What's Broken."
2.64 security failures per day. That's the math since OpenClaw launched in November 2025. The longest streak without a CVE? Twelve days, from February 7 to 18. That was the best it got.
The Numbers
FlyingPenguin's analysis attributes 376 of those CVEs to VulnCheck, a respected CNA. The rest came through other channels. But the raw count is only part of the story.
Here's what actually scares me:
63% of internet-reachable OpenClaw instances run with authentication disabled
42,900 exposed instances online right now
15,200 of those directly vulnerable to remote code execution
341 malicious skills flagged out of 2,857 reviewed on ClawHub (roughly 900 estimated by March)
Microsoft Defender now classifies OpenClaw as "untrusted code execution with persistent credentials." Oasis Security published a separate finding that any website you visit can silently take full control of a running OpenClaw agent. Think about that for a second.
Five Categories of Failure
FlyingPenguin groups the vulnerabilities into what they call "Flobster" categories. Trust-boundary collapse leads with 47 advisories. Authorization scope problems account for 41. Exec-boundary injection at 18, control-plane exposure at 10, and LLM-surface vulnerabilities round it out with three.
The pattern is clear: OpenClaw was built fast, shipped fast, and security was an afterthought.
What This Means If You Self-Host
Self-hosting OpenClaw means you're personally responsible for tracking and patching 2.6 CVEs per day. Every single day. Miss one, and you're potentially exposing your server to remote code execution.
Most people running OpenClaw at home don't even know these CVEs exist until a blog post like FlyingPenguin's goes viral.
On ClawHosters, security patches land before most users hear about the vulnerability. No public gateway exposure, no default-disabled auth, no localhost trust assumptions. That's not marketing talk. It's the result of running managed infrastructure where someone actually watches the CVE feeds daily.
If you want the full picture on how we handle this, our security hardening guide breaks down every layer. And the managed vs. self-hosted comparison puts the real trade-offs side by side.
Plans start at $3.90/month. Probably cheaper than the time you'd spend chasing 2.64 CVEs a day.