Это не пропаганда ЛГБТ, они просто дырявые и это факт
дальше надеюсь Ынжинеры сей чудесной конторы узнают свои творения (к вам притензий нет, вам менеджмент сказал, вы сказал Можем)
We have identified a critical risk in the OpenClaw image on the C****.ru Marketplace.
REAL DATA: Public OSINT sources (Shodan, Hunt.io) confirm thousands of instances exposed globally on Port 18789 due to the default 0.0.0.0 binding used in Docker templates.
Users deploying this image on Evolution Free Tier (which defaults to permissive Security Groups) are compromised immediately.
Fact: OpenClaw binds its unauthenticated Admin API to 0.0.0.0:18789 by default.
Evidence: Shodan queries for port:18789 reveal operational dashboards accessible from the public internet.
Impact: Any user deployment without a custom Firewall Policy is fully exposed.
Recon: Attacker scans C****.ru IP ranges for Port 18789.
Access: GET /dashboard returns the Admin UI (No Auth).
RCE: POST /api/exec allows running curl or bash scripts.
Cloud Breakout: curl 169.254.169.254 retrieves IAM Metadata credentials (stolen cloud identity).
Do not rely on simulation. Verify this on your own platform:
Deploy a new OpenClaw instance from your Marketplace.
Run: curl -I http://[INSTANCE_IP]:18789/
Expected Result: HTTP 200 OK (Admin Panel).
Safe Result: Connection Refused (Required outcome).
Change docker-compose.yml binding:
ports: - "127.0.0.1:18789:18789" # WAS 0.0.0.0:18789
Ensure the Marketplace template applies a strict Security Group:
Ingress: Allow SSH (22) ONLY.
Block: ALL other inbound TCP.
Add a disclaimer: "This image is for Localhost Use via SSH Tunnel only. Do not expose to Public IP."
Security teams can identify vulnerable assets using these signatures:
Shodan: port:18789 product:"Moltbot" http.title:"Dashboard"
Censys: services.port: 18789 AND services.http.response.body: "gatewayUrl"
Hunt.io: product.name:"OpenClaw" protocol:"http" port:18789
A vulnerable instance typically returns:
HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Access-Control-Allow-Origin: * Server: Moltbot-Gateway/1.2.9 Date: Fri, 06 Feb 2026 10:00:00 GMT Content-Length: 452
Note: The Access-Control-Allow-Origin: * header confirms the CSRF vulnerability.
Requesting GET /api/config on an exposed instance returns critical infrastructure details:
{ "gatewayUrl": "ws://хх.128.0.5:18789", "agentId": "agent-8f2a1...", "permissions": { "exec": true, "filesystem": true }, "llmProvider": "openai", "version": "1.2.9" }
Generated by SENTINEL Strike Force.
Вы делаете ваших клиентов уязвимыми нереально небезопасными в интернете.
Источник


