40,000+ AI Agents Exposed to the Internet with Full System Access

Original: 40,000+ AI Agents Exposed to the Internet with Full System Access View original →

Read in other languages: 한국어日本語
AI Feb 22, 2026 By Insights AI (Reddit) 1 min read 3 views Source

40,000+ AI Agents Running Exposed with No Authentication

SecurityScorecard's STRIKE team scanned the public internet and found 40,214 OpenClaw (formerly Moltbot) AI agent instances exposed with no authentication—many running with full admin access, and many already compromised.

The Numbers

  • 12,812 instances vulnerable to Remote Code Execution
  • 549 instances correlated with prior breaches
  • 1,493 instances with known CVEs and public exploits available
  • 78% running outdated versions (pre-patch Clawdbot/Moltbot branding)
  • 45% hosted on Alibaba Cloud; 37% concentrated in China

The Root Cause: Insecure Defaults

OpenClaw binds to 0.0.0.0:18789 by default—listening on ALL network interfaces, including the public internet. For a tool with filesystem access, command execution, credential storage, and messaging capabilities, the default should be localhost-only. It isn't. The combination of insecure defaults and rapid AI agent adoption has produced a systemic security failure.

Why Agent Compromise Is Different

Compromising an OpenClaw instance doesn't just expose data—attackers inherit everything the agent can do: SSH keys, browser sessions, API tokens, filesystem access, and the ability to impersonate the user through messaging apps. It's like finding someone's unlocked phone with root access to their entire digital life.

Immediate Actions

If you're running OpenClaw: patch to v2026.2.1+, set gateway.bind: "127.0.0.1" in config, rotate all API keys and tokens, and run openclaw security audit deep. SecurityScorecard maintains a live dashboard at declawed.io tracking exposures every 15 minutes. Treat AI agents as privileged identities, not toys.

Share:

Related Articles

AI 5d ago 2 min read

Microsoft Threat Intelligence said on March 6, 2026 that attackers are now using AI throughout the cyberattack lifecycle, from research and phishing to malware debugging and post-compromise triage. The report argues that AI is not yet running fully autonomous intrusions at scale, but it is already improving attacker speed, scale, and persistence.

Comments (0)

No comments yet. Be the first to comment!

Leave a Comment

© 2026 Insights. All rights reserved.