Security at Rapid Claw
Every instance is sandboxed, encrypted, and automatically patched. Here's exactly how.
Infrastructure Security
Your OpenClaw instance runs in a purpose-built security envelope. Each architectural decision exists to minimise blast radius if something goes wrong.
Container isolation
Every instance runs in its own isolated container. If an exploit fires, the blast radius is contained to that single container — your data and other customers' instances are untouched.
Restricted egress
Outbound connections are limited to explicitly allowlisted endpoints by default. Exploits that attempt to exfiltrate data to an attacker-controlled server fail at the network layer.
Non-root execution
Agent processes run as unprivileged users inside their containers. Even with a container escape, the attack surface on the underlying host is minimised.
Memory isolation
cgroup-enforced memory and CPU limits prevent one noisy or compromised instance from affecting others. Resource exhaustion attacks are contained.
Credential Security
Your API keys, OAuth tokens, and integration credentials are the most sensitive data you hand to an AI agent. We treat them accordingly.
AES-256 encryption at rest
All credential data is encrypted using AES-256-GCM before being written to disk. Encryption keys are managed separately from the data they protect.
Isolated credential vault
Credentials live in a dedicated vault service, completely separate from the execution environment. The agent runtime accesses credentials via short-lived tokens — never direct storage reads.
Zero-knowledge design
No Rapid Claw staff can read your credentials. The vault is designed so that even internal access to the infrastructure does not expose plaintext credential values.
Runtime injection only
Credentials are injected at container startup and never logged, never written to disk in plaintext, and never echoed in error output. Logs are scrubbed before being stored.
Patch & Update Security
The average self-hosted OpenClaw instance was running 47 days behind at time of migration to Rapid Claw. Our automatic patching means you're never that instance.
4-hour critical CVE SLA
We commit to patching all customer instances within 4 hours of a critical CVE advisory being published. This SLA is contractual on Pro and Enterprise plans.
CVE-2026-25253 & CVE-2026-25593: patched in 3 hours
When the March 2026 OpenClaw CVEs were disclosed, we applied patches across all customer instances within 3 hours — before most self-hosted users had even read the advisory.
No action required from customers
Patches are deployed automatically to every running instance. You don't need to update, restart, or re-deploy anything. Your agent keeps running on patched software.
Staging validation before rollout
Every patch is validated against a staging environment before production rollout. We verify that patched builds pass the full test suite and don't introduce regressions.
March 2026
CVE-2026-25253 & CVE-2026-25593 — patched in 3 hours
When two critical OpenClaw CVEs were disclosed simultaneously, exposing over 40,000 self-hosted instances to remote code execution, all Rapid Claw customer instances were fully patched within 3 hours — before most self-hosted users had finished reading the advisory. Read the full analysis →
Audit & Observability
An AI agent with production credentials needs a complete, tamper-proof record of what it did. We give you that.
Every agent action logged
API calls, database queries, file operations, and outbound connections are captured in structured logs. Nothing your agent does is invisible.
Immutable log storage
The agent process cannot modify or delete its own logs. Logs are written to append-only storage under a separate trust boundary — a compromised container cannot cover its tracks.
Isolated log shipping
Logs are shipped in real-time to isolated storage separate from the execution environment. A total container failure does not result in log loss.
Full incident reconstruction
The complete log history lets you reconstruct exactly what your agent did, when, and to what systems — critical for post-incident analysis and compliance reporting.
Responsible Disclosure
We take security reports seriously. If you find a vulnerability in Rapid Claw, we want to know.
Contact our security team
Email security@rapidclaw.dev with a description of the issue, steps to reproduce, and your assessment of impact. Please do not disclose publicly until we have had a chance to respond.
Initial response
Within 24 hours
Critical patch SLA
Within 72 hours
Status updates
Every 48 hours
We don't currently offer a formal bug bounty, but we credit all researchers who responsibly disclose to us — publicly, with your permission.
Sandboxed. Patched automatically. Isolated by default.
Get your OpenClaw instance running in under 3 minutes. Every security property on this page, live on day one.