Microsoft warns that OpenClaw can quietly turn your everyday workstation into a high-risk automation gateway


  • OpenClaw can silently perform dangerous actions while you have full access credentials
  • Persistent tokens allow subtle manipulations to remain undetected across multiple sessions
  • Running OpenClaw on standard workstations exposes critical data to invisible risks

Microsoft security researchers have warned that OpenClaw should not run on ordinary personal or corporate workstations.

A new Microsoft Security blog post outlines how the risk is tied to how the runtime works — which mixes untrusted instructions with executable code while using valid credentials.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top