But the security issues are real. The former Clawdbot with 85K+ GitHub stars has some serious gaps:

Some are reporting that enterprise employees are running this without IT knowing. I tend to believe it.

Quick summary of the hardening guide from NickSpisak_ on X:

  1. Bind gateway to localhost only ("bind": "loopback")
  2. Lock down file permissions — chmod 700 on config folders
  3. Disable mDNS/Bonjour network broadcasting
  4. Run clawdbot security audit --deep --fix
  5. Set up token or password authentication on the gateway
  6. Use Tailscale for remote access — never expose port 18789 publicly
  7. Update Node.js to 22.12.0+

The hardening guide from NickSpisak_

Moltbot security gaps: plaintext credentials, exposed admin ports, no sandboxing