What Is Clawdbot? A Clear Guide to This AI Assistant
10 min read
Feb 02, 2026

What is Clawdbot?
How does Clawdbot work?
How to set up Clawdbot on your device
1. Install Node.js and Clawdbot
Your system must have Node.js version 22 or higher. Ubuntu users can run these commands to install Node.js 22:
curl -fsSL https://deb.nodesource.com/setup_22.x | bash - apt install -y nodejs
- Official installer script (recommended):curl -fsSL https://clawd.bot/install.sh | bash
- Manual npm installation[152]:npm install -g clawdbot@latest
Check your setup with:
clawdbot doctor
2. Authenticate with OpenAI or Claude
Clawdbot works with both OAuth and API keys from model providers. Here's how to authenticate:
- Option A: Use API key (recommended)export ANTHROPIC_API_KEY='your-key-here' clawdbot models status
- Option B: Use Claude setup-token (for subscription users):claude setup-token clawdbot models auth setup-token --provider anthropic
4. For OpenAI/other providers:clawdbot models auth paste-token --provider openrouter
Connect messaging platforms
- 5.WhatsApp: Run clawdbot channels login and scan the QR code. You'll find this under Settings → Linked Devices in your WhatsApp app.
- Message @BotFather on Telegram
- Send /newbot and follow the prompts
- Get your token and user ID from @userinfobot
- Add both when you run clawdbot onboard --install-daemon
Install Clawdbot skills
- Install skills through ClawdHub:clawdhub install
- Update all installed skills:clawdhub update --all
Pair devices and test
- See pending device requests:clawdbot devices list
- Approve or reject devices:clawdbot devices approve
clawdbot pairing approve
Run this command to make sure everything works:
clawdbot health
This shows that your Gateway, authentication, and channel connections are working properly.
What are the security risks of using Clawdbot?
Prompt injection vulnerabilities
Prompt injection poses one of the most important threats as attackers craft messages that manipulate the AI to perform unsafe actions. This vulnerability exists even when only trusted users can message the bot because untrusted content from web searches, emails, or documents can carry adversarial instructions. Attackers exploit this weakness to exfiltrate sensitive files, leak private keys, or run arbitrary commands. These attacks work because large language models cannot reliably tell the difference between instructions and content.
Exposed control interfaces
Security researchers found that there were hundreds of internet-facing control panels linked to Clawdbot. These exposed dashboards let outsiders view configuration data, retrieve API keys, and browse full conversation histories. Some instances even allowed unauthenticated command execution on host systems with elevated privileges. Shodan searches show 1,009 Clawdbot gateways are exposed on the public internet today.
Supply chain risks from ClawdHub
ClawdHub, Clawdbot's skill distribution platform, brings supply chain vulnerabilities like those in npm and PyPI. Security researchers showed this risk by uploading a simulated backdoored skill that looked legitimate. They artificially raised its download count to 4,000+, making it the most downloaded skill. The proof-of-concept attracted 16 executions across seven countries in just eight hours. The platform treats all code as trusted and lacks proper vetting processes.
Misconfigured localhost access
Trust assumptions around localhost connections cause many exposures. Clawdbot supports cryptographic device authentication, but some configurations auto-approve connections from localhost. External traffic may appear as loopback traffic when the gateway sits behind a reverse proxy unless trusted proxies are configured correctly. This setup creates a situation where proxied connections look like they come from localhost and get automatic trust.
Phishing and impersonation threats
Early-stage phishing and impersonation signals are emerging as Clawdbot grows. Over 50 domains with the 'clawd' keyword have been registered, that indicates potential opportunistic abuse. Attackers could easily impersonate the operator and siphon data through trusted integrations since Clawdbot can send messages as the operator, inject content into ongoing conversations, and execute commands across services.
Key Takeaways
- Local control matters: Clawdbot runs on your hardware, ensuring data privacy and avoiding subscription lock-in while maintaining persistent memory across sessions.
- Actions beyond chat: Unlike traditional chatbots, Clawdbot executes real tasks like file management, email handling, and system commands through modular skills.
- Security requires vigilance: Over 1,000 exposed instances highlight critical risks including prompt injection attacks, misconfigured access controls, and supply chain vulnerabilities from ClawdHub.
- Setup demands technical knowledge: Installation requires Node.js 22+, API authentication, platform integration, and proper device pairing to function securely.
- Trust comes with trade-offs: Clawdbot's power stems from extensive system access and credential storage, making proper configuration essential for safe operation.
FAQs
Clawdbot is an open-source, self-hosted AI assistant that runs locally on your device. It acts as an intermediary between messaging platforms like Telegram and WhatsApp and large language models like Claude or ChatGPT. Clawdbot routes messages to these AI models, interprets responses, and can execute various tasks and tools on your behalf.
Setting up Clawdbot involves installing Node.js, authenticating with an AI model provider like OpenAI or Anthropic, connecting messaging platforms, installing Clawdbot skills, and pairing devices. The process requires some technical knowledge and comfort with using the command line. Detailed setup instructions are available in the Clawdbot documentation.
Yes, Clawdbot can be configured to work with locally hosted language models through tools like Ollama or LM Studio. However, setting this up can be more complex than using cloud APIs. You'll need to properly configure the local model endpoint in Clawdbot's settings.
The primary security concerns include prompt injection vulnerabilities, exposed control interfaces if not properly secured, supply chain risks from third-party skills, misconfigured access controls, and potential for phishing or impersonation attacks. Clawdbot has extensive system access, so proper configuration and ongoing vigilance are essential.
The Clawdbot software itself is free and open-source. However, if using cloud AI APIs, you'll incur usage costs based on the number of tokens processed. Costs can vary widely depending on usage patterns and which AI model you connect to. Some users report spending anywhere from a few dollars to over $100 per day in API costs for heavy usage.
By Vaibhav Sharma