By continuing to browse our site you agree to our use of cookies, revised Privacy Policy and Terms of Use. You can change your cookie settings through your browser.
The logo of the open-source AI agent OpenClaw. /VCG
The logo of the open-source AI agent OpenClaw. /VCG
China on Sunday issued the security guidance for the use of the open-source AI agent OpenClaw, advising users, cloud service providers and developers to reduce risks during deployment and operation.
The guidance, jointly issued by the National Computer Network Emergency Response Technical Team/Coordination Center of China and the Cyber Security Association of China, recommends that ordinary users install OpenClaw on dedicated devices, virtual machines or containers, maintain strict environment isolation, and avoid installing it on everyday work computers.
Ordinary users are also advised not to run OpenClaw with administrator or superuser privileges, avoid storing or processing private or sensitive data within OpenClaw environments, and keep OpenClaw updated to the latest releases.
For cloud service providers, the guide advises conducting baseline security assessments and hardening of cloud hosts, deploying and integrating appropriate security protection capabilities, and strengthening supply-chain and data security defenses.
The guidance also offers tailored security best practices for enterprise users and technical developers.
The logo of the open-source AI agent OpenClaw. /VCG
China on Sunday issued the security guidance for the use of the open-source AI agent OpenClaw, advising users, cloud service providers and developers to reduce risks during deployment and operation.
The guidance, jointly issued by the National Computer Network Emergency Response Technical Team/Coordination Center of China and the Cyber Security Association of China, recommends that ordinary users install OpenClaw on dedicated devices, virtual machines or containers, maintain strict environment isolation, and avoid installing it on everyday work computers.
Ordinary users are also advised not to run OpenClaw with administrator or superuser privileges, avoid storing or processing private or sensitive data within OpenClaw environments, and keep OpenClaw updated to the latest releases.
For cloud service providers, the guide advises conducting baseline security assessments and hardening of cloud hosts, deploying and integrating appropriate security protection capabilities, and strengthening supply-chain and data security defenses.
The guidance also offers tailored security best practices for enterprise users and technical developers.