A recent security investigation has uncovered **hundreds of internet-facing control interfaces** linked to Moltbot (formerly Clawdbot) installations. These exposed dashboards pose significant risks to users' security and privacy.
What Was Found
Researchers discovered that many Moltbot users have inadvertently exposed their administrative panels to the public internet. In multiple cases, access to these interfaces allowed outsiders to:
- View configuration data
- Retrieve API keys for services like Anthropic, OpenAI, and others
- Browse full conversation histories from private chats
- Access file exchanges and stored documents
How This Happens
Most exposures occur due to:
1. **Running without authentication** - Using default configurations that don't require login
2. **Port forwarding mistakes** - Accidentally exposing the dashboard port to the internet
3. **Cloud misconfigurations** - Setting up VPS instances without proper firewall rules
4. **Reverse proxy errors** - Incorrectly configuring nginx or Caddy
Immediate Actions
If you're running Moltbot, take these steps immediately:
1. Check Your Exposure
Run this command to see if your dashboard is accessible externally:
curl -I http://YOUR_SERVER_IP:3000
If you get a response, your panel may be exposed.
2. Enable Authentication
Make sure you've configured authentication in your Moltbot settings:
auth:
enabled: true
username: your_username
password: your_secure_password
3. Use a Firewall
Only allow access from trusted IPs:
# UFW example
sudo ufw deny 3000
sudo ufw allow from YOUR_IP to any port 3000
4. Rotate Compromised Keys
If you suspect your API keys were exposed, immediately:
- Rotate your Anthropic/OpenAI/Google API keys
- Review your conversation logs for sensitive information
- Check for unauthorized activity in your linked accounts
Recommendations from Brave
The Brave browser team issued guidance recommending that users:
- Run Moltbot on isolated machines
- Limit account access
- Never expose the dashboard directly to the internet
- Use VPN or SSH tunneling for remote access
Moving Forward
The Moltbot team is working on:
- Mandatory authentication in future releases
- Better default security configurations
- Security audit tools built into the dashboard
- Documentation improvements around secure deployment
Stay vigilant and review your configuration today.