Skip to content

Security hardening for Moltbot/Clawdbot. Lock down gateway, fix permissions, set up auth, firewalls, Tailscale.

Notifications You must be signed in to change notification settings

NextFrontierBuilds/moltbot-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Moltbot Security Guide

🔒 Lock Down Your AI Agent — Security hardening for Moltbot/Clawdbot. Don't be one of the 1,673+ exposed gateways.

npm version License: MIT


⚠️ Based on real vulnerability research that found 1,673+ exposed gateways on Shodan


Security hardening for Moltbot/Clawdbot. Lock down your gateway, fix file permissions, set up authentication, configure firewalls.

Install

ClawdHub:

clawdhub install NextFrontierBuilds/moltbot-security

npm:

npm install moltbot-security

The 5 Essentials

  1. Bind to loopback — Never expose gateway publicly
  2. Set auth token — Require authentication
  3. Fix file permissions — Only you read configs
  4. Update Node.js — v22.12.0+ required
  5. Use Tailscale — Secure remote access

Quick Audit

clawdbot security audit --deep --fix

What Gets Exposed

Without proper security:

  • Conversation histories (Telegram, WhatsApp, Signal)
  • API keys (Claude, OpenAI)
  • OAuth tokens and credentials
  • Full shell access

Secure Config Template

{
  "gateway": {
    "bind": "loopback",
    "auth": {
      "mode": "token",
      "token": "YOUR_64_CHAR_HEX_TOKEN"
    },
    "tailscale": {
      "mode": "serve"
    }
  }
}

Credits

Based on research by @NickSpisak_


Built by @NextXFrontier

About

Security hardening for Moltbot/Clawdbot. Lock down gateway, fix permissions, set up auth, firewalls, Tailscale.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published