🦞
SecurityJanuary 26, 2026

Security Alert: Exposed Control Panels Risk Credential Leaks

By Security Team

A recent security investigation has uncovered **hundreds of internet-facing control interfaces** linked to Moltbot (formerly Clawdbot) installations. These exposed dashboards pose significant risks to users' security and privacy.

What Was Found

Researchers discovered that many Moltbot users have inadvertently exposed their administrative panels to the public internet. In multiple cases, access to these interfaces allowed outsiders to:

- View configuration data

- Retrieve API keys for services like Anthropic, OpenAI, and others

- Browse full conversation histories from private chats

- Access file exchanges and stored documents

How This Happens

Most exposures occur due to:

1. **Running without authentication** - Using default configurations that don't require login

2. **Port forwarding mistakes** - Accidentally exposing the dashboard port to the internet

3. **Cloud misconfigurations** - Setting up VPS instances without proper firewall rules

4. **Reverse proxy errors** - Incorrectly configuring nginx or Caddy

Immediate Actions

If you're running Moltbot, take these steps immediately:

1. Check Your Exposure

Run this command to see if your dashboard is accessible externally:

curl -I http://YOUR_SERVER_IP:3000

If you get a response, your panel may be exposed.

2. Enable Authentication

Make sure you've configured authentication in your Moltbot settings:

auth:

enabled: true

username: your_username

password: your_secure_password

3. Use a Firewall

Only allow access from trusted IPs:

# UFW example

sudo ufw deny 3000

sudo ufw allow from YOUR_IP to any port 3000

4. Rotate Compromised Keys

If you suspect your API keys were exposed, immediately:

- Rotate your Anthropic/OpenAI/Google API keys

- Review your conversation logs for sensitive information

- Check for unauthorized activity in your linked accounts

Recommendations from Brave

The Brave browser team issued guidance recommending that users:

- Run Moltbot on isolated machines

- Limit account access

- Never expose the dashboard directly to the internet

- Use VPN or SSH tunneling for remote access

Moving Forward

The Moltbot team is working on:

- Mandatory authentication in future releases

- Better default security configurations

- Security audit tools built into the dashboard

- Documentation improvements around secure deployment

Stay vigilant and review your configuration today.