NanoClaw solves one of OpenClaw's biggest security issues

venturebeat.com

32 points by marsh_mellow 3 hours ago


senko - 3 hours ago

File system access is not one of OpenClaw's biggest security issues. If that were so, running it in a VM or another computer (I hear Mac Minis are popular!) would solve it.

If you need it to do anything useful[0], you have to connect it to your data and give it action capabilities. All the dragons are there.

If you play it careful and don't expose your data, comm channels, etc., then it's much like the other AI assistants out there.[1]

---

[0] for your definition of useful

[1] I do appreciate the self-modification and heartbeat aspects, and don't want to downplay how technically impressive it is. The comment is purely from POV of an end-user product.

mjr00 - 2 hours ago

> Concrete Media: Public Relations for B2B tech companies

This is a marketing piece for Concrete Media.

Whenever you see an article like this, be sure to ask yourself how the author came up with the idea for the article, and how the author got in contact with any people interviewed in the article.

hardsnow - an hour ago

Container isolation is a good foundation, but one layer worth adding is network sandboxing. A filesystem-sandboxed agent can still exfiltrate data over the network if it gets prompt-injected — domain allowlists and egress filtering can reduce the risk significantly.

Another useful primitive is surrogate credentials: the agent never handles real API keys or tokens. A proxy swaps in real values only for scoped hosts on the way out. This keeps the access the agent has locked inside the container; surrogate credentials are not valid outside.

My Claude Code over email project demonstrates both of these: https://github.com/airutorg/airut

sathish316 - an hour ago

How is NanoClaw immune to the Lethal trifecta attack based on prompt injection that OpenClaw is also prone to?

https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/

Lethal trifecta:

1. Access to your private data

2. Exposure to untrusted content

3. The ability to externally communicate

Any combination of 1-3 or more skills can result in a prompt injection attack if it satisfies the above criteria - Gmail or sales personal data, Reddit or X posts or comments in white text, Gmail or Reddit or X to send confidential information to the attacker.

netdur - 2 hours ago

I have tried to solve the agent running wild, and I found two solutions, the first is to mount the workspace folder using WASM to scope any potential damage, the second is running rquickjs with all APIs and module imports disabled, requiring the agent to call a host function that checks permissions before accessing any files

--- [0] https://github.com/netdur/hugind

bryan0 - 2 hours ago

Nanoclaw is excellent. Natively uses Apple containers and easy to use with oauth Claude code subscription. Only annoying thing was it defaults to WhatsApp, but it’s easy to fork and mod as you want. The best thing is asking it to mod itself!

benocodes - 2 hours ago

if you're looking for the repo: https://github.com/qwibitai/nanoclaw

not 500 lines but looks more reasonable then openclaw

Kevcmk - 2 hours ago

This “article” completely written with “AI”

tmaly - an hour ago

Aside from the security differences, what can OpenClaw do that NanoClaw cannot?

moomoo11 - 2 hours ago

This is why I really think for AI tools it’s probably good to just start fresh.

Like our emails, files, other accounts and stuff. That’s “ours” and personal.

Even for business, that should be off limits.

What we do give to AI should be brand new blank slates. Like say I roll out an AI solution in March 2026. That is the seed from which everything we do using AI will work.

To get there we could move data we want to the new environment. But no access to any existing stuff. We start fresh.

If it needs to take any actions on behalf of our existing accounts it needs to go through some secure pipeline where it only tells us intent, without access.

ChrisArchitect - 2 hours ago

Previous discussion on the Show HN: from the dev:

https://news.ycombinator.com/item?id=46850205