Ask HN: If there has been no prompt injection, is it safe?
3 points
6 hours ago
| 4 comments
| HN
As I use open claw I am concerned about prompt injection more than bad code. However I think I'm irrationally paranoid. I'm small fries I'm a single individual, someone actively trying to hack me is exploiting a multi-million dollar zero day and they're not doing that on me.

If we're thinking about accidentally deleting everything through a terminal command, I've yet to see this actually occur.

Deductively I can see all of the worst case scenarios with open claw. Inductively I've never seen it actually happen.

I find it a bit irrational to pretend that open claw is a genuine security risk.

The moment I see on Hacker News that someone got prompt injected, I think I'll be concerned. Until then I would need almost a lottery like chance to get hacked as the first person through prompt injection.

Beckmeister
2 hours ago
[-]
https://www.notion.so/Inside-OpenClaw-Deploying-Sniffing-and...

Lab 2 there shows you how you can use socat to intercept that data passing between OpenClaw and LLM. It's interesting to look at all the tooling (and modify it if you like) around the user prompt. --Might help if you are interested.

reply
MarcelinoGMX3C
3 hours ago
[-]
I've been on the defense side for a while, and the "it hasn't happened yet" argument is dangerous territory. The surface area for attack definitely increases with agentic systems.

The comment about malicious package installs is a much more realistic threat, as an example. Prompt injection is one angle, but defending against a supply chain compromise or an agent being tricked into exfiltrating secrets should be a higher priority. That's a more direct and exploitable vector.

reply
TheTaytay
6 hours ago
[-]
I think the more likely attack vector in OpenClaw is convincing it to install a malicious npm package or script, have that siphon all machine/env secrets, and then watch those secrets get abused. (Cloud API key -> crypto mining. Wallet key->theft. Npm credentials->worm publishes more copies of itself. GitHub key->more theft and malicious code upload. Email API key->IP theft and password reset on other systems) Almost all of this can be automated, so the attacker doesn’t have to know who you are.

It’s not targeted per se.

reply
verdverm
5 hours ago
[-]
> I find it a bit irrational to pretend that open claw is a genuine security risk.

Except that it is an actual security risk, no pretending is needed. In general, agents expand the security surface and attack vectors, regardless of framework.

Your argument that it hasn't happened, therefore it doesn't exist is a well known cognitive bias.

See the Lethal Trifecta for one way in which security requires more thoughtfulness.

reply