Real CVEs. Real attacks. Real hardening commands. Protect your self-hosted AI from the 31+ known vulnerabilities actively being exploited right now.
Open WebUI has 31+ known security vulnerabilities including two unpatched zero-day remote code execution flaws (CVSS 8.8). Over 17,000 instances sit exposed on the public internet. Active attacks are happening right now: cryptominers, data theft, API key harvesting, and the ClawHavoc supply chain attack that poisoned 20% of ClawHub skills with info-stealing malware.
Three security resources: a 2-page quick-start that stops 80% of attacks in 15 minutes, a full Mac Mini hardening guide (9 steps), and a complete VPS hardening guide (13 steps). Each includes the exact commands, explains why they matter, and covers AI-specific threats no other guide addresses.
Upload a skill file that runs arbitrary commands on your server. One-click takeover.
Inject code through the tool-loading system. Bypass all input validation.
Attackers escape the container and take over your entire host machine.
Single link click grants full remote code execution on the server.
1,184+ malicious skills were planted on ClawHub masquerading as crypto trading bots. They deployed AMOS info-stealer malware that harvests browser credentials, crypto wallets, SSH keys, and API keys. 2,419 skills were removed (42% of the registry). This is why you audit every skill before installing.
Whether you're on a VPS or Mac Mini, these 6 actions block the most common attack vectors. Each takes under 3 minutes.
Generate a 64-char random key with openssl rand -hex 32. Set WEBUI_SECRET_KEY in your .env (Docker) or ~/.bashrc (Direct). Set ENABLE_SIGNUP=False.
Set ENABLE_PIP_INSTALL_FRONTMATTER_REQUIREMENTS=False. Then go to Admin Panel > Workspace > Permissions and remove workspace.tools from all non-admin users.
Docker: change ports to "127.0.0.1:3000:8080". Local models (Ollama, LM Studio): verify they show 127.0.0.1 not 0.0.0.0 or *.
VPS: UFW with Docker-aware rules. Mac: Application Firewall + Stealth Mode + PF packet filter. Only allow the ports you actually need.
3 lines in a Caddyfile. Auto-provisions TLS 1.3, certificate renewal, and HTTP-to-HTTPS redirect. Completely free. Alternative: Cloudflare Tunnel for zero open ports.
9+ CVEs since January 2026. OpenClaw v2026.1.29 patches the CVSS 8.8 one-click RCE. Docker Desktop must be v4.44.3+ to fix the container escape.
The complete guides go deeper with platform-specific hardening:
Tailscale zero-trust remote access, three-layer macOS firewall (Application + PF + LuLu), macOS Keychain for API keys, FileVault encryption, SIP/Gatekeeper/XProtect verification, Docker Desktop hardening, automatic updates, AI-specific threat mitigations.
SSH key auth + fail2ban, Docker container isolation (read-only, cap_drop ALL, network segmentation), kernel sysctl hardening, CrowdSec intrusion detection, Caddy hardened config with security headers, Docker secrets for API keys, Cloudflare Tunnel alternative, encrypted offsite backups with Restic, AI-specific threat defense (SSRF, prompt injection, model poisoning).
Give this to your AI agent to audit and harden your Open WebUI / OpenClaw installation. It checks all 6 critical areas and generates a fix script.
This prompt walks through the complete hardening guide for either Mac Mini or VPS. It covers all steps beyond the 80/20 quick-start.
This prompt creates a V1 scaffold. Production requires wiring real data sources, QA passes, error handling, retry logic, and safety gates. Treat the output as a working prototype — not a ship-ready system.