Skip to content
Trust & Security

Security at Rapid Claw

Every instance is sandboxed, encrypted, and automatically patched. Here's exactly how.

AES-256 encrypted4-hr CVE patch SLAHigh-availability hostingZero standing staff access

Infrastructure

Infrastructure Security

Your OpenClaw instance runs in a purpose-built security envelope. Each architectural decision exists to minimise blast radius if something goes wrong.

Container isolation

Every instance runs in its own isolated container. If an exploit fires, the blast radius is contained to that single container — your data and other customers' instances are untouched.

Restricted egress

Outbound connections are limited to explicitly allowlisted endpoints by default. Exploits that attempt to exfiltrate data to an attacker-controlled server fail at the network layer.

Non-root execution

Agent processes run as unprivileged users inside their containers. Even with a container escape, the attack surface on the underlying host is minimised.

Memory isolation

cgroup-enforced memory and CPU limits prevent one noisy or compromised instance from affecting others. Resource exhaustion attacks are contained.


Credentials

Credential Security

Your API keys, OAuth tokens, and integration credentials are the most sensitive data you hand to an AI agent. We treat them accordingly.

AES-256 encryption at rest

All credential data is encrypted using AES-256-GCM before being written to disk. Encryption keys are managed separately from the data they protect.

Isolated credential vault

Credentials live in a dedicated vault service, completely separate from the execution environment. The agent runtime accesses credentials via short-lived tokens — never direct storage reads.

Zero-knowledge design

No Rapid Claw staff can read your credentials. The vault is designed so that even internal access to the infrastructure does not expose plaintext credential values.

Runtime injection only

Credentials are injected at container startup and never logged, never written to disk in plaintext, and never echoed in error output. Logs are scrubbed before being stored.


Patching

Patch & Update Security

The average self-hosted OpenClaw instance was running 47 days behind at time of migration to Rapid Claw. Our automatic patching means you're never that instance.

4-hour critical CVE SLA

We commit to patching all customer instances within 4 hours of a critical CVE advisory being published. This SLA is contractual on Pro and Enterprise plans.

CVE-2026-25253 & CVE-2026-25593: patched in 3 hours

When the March 2026 OpenClaw CVEs were disclosed, we applied patches across all customer instances within 3 hours — before most self-hosted users had even read the advisory.

No action required from customers

Patches are deployed automatically to every running instance. You don't need to update, restart, or re-deploy anything. Your agent keeps running on patched software.

Staging validation before rollout

Every patch is validated against a staging environment before production rollout. We verify that patched builds pass the full test suite and don't introduce regressions.

March 2026

CVE-2026-25253 & CVE-2026-25593 — patched in 3 hours

When two critical OpenClaw CVEs were disclosed simultaneously, exposing over 40,000 self-hosted instances to remote code execution, all Rapid Claw customer instances were fully patched within 3 hours — before most self-hosted users had finished reading the advisory. Read the full analysis →


Audit

Audit & Observability

An AI agent with production credentials needs a complete, tamper-proof record of what it did. We give you that.

Every agent action logged

API calls, database queries, file operations, and outbound connections are captured in structured logs. Nothing your agent does is invisible.

Immutable log storage

The agent process cannot modify or delete its own logs. Logs are written to append-only storage under a separate trust boundary — a compromised container cannot cover its tracks.

Isolated log shipping

Logs are shipped in real-time to isolated storage separate from the execution environment. A total container failure does not result in log loss.

Full incident reconstruction

The complete log history lets you reconstruct exactly what your agent did, when, and to what systems — critical for post-incident analysis and compliance reporting.


Disclosure

Responsible Disclosure

We take security reports seriously. If you find a vulnerability in Rapid Claw, we want to know.

Contact our security team

Email security@rapidclaw.dev with a description of the issue, steps to reproduce, and your assessment of impact. Please do not disclose publicly until we have had a chance to respond.

Initial response

Within 24 hours

Critical patch SLA

Within 72 hours

Status updates

Every 48 hours

We don't currently offer a formal bug bounty, but we credit all researchers who responsibly disclose to us — publicly, with your permission.


Ready to run securely?

Sandboxed. Patched automatically. Isolated by default.

Get your OpenClaw instance running in under 3 minutes. Every security property on this page, live on day one.