Chinese government cracks down on in-office OpenClaw use over potential security risks
OpenClaw's popularity is growing rapidly despite repeated warnings
· TechRadarNews By Efosa Udinmwen published 15 March 2026
Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter
Get the TechRadar Newsletter
Sign up for breaking news, reviews, opinion, top tech deals, and more.
Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors
By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
You are now subscribed
Your newsletter sign-up was successful
An account already exists for this email address, please log in. Subscribe to our newsletter
- OpenClaw’s deep system access creates major security concerns for enterprise environments
- Chinese authorities warn that autonomous AI agents can unexpectedly expose corporate systems
- Prompt injection attacks threaten AI assistants operating directly inside workplace networks
Chinese cybersecurity authorities have issued fresh warnings about the workplace use of OpenClaw.
The authorities cite growing concerns that its rapid adoption may expose organizations to data and operational risks.
The alerts come as businesses and local governments across the country continue experimenting with the autonomous software agent.
Article continues below
OpenClaw is as risky as it is convenient
The notice was issued by the National Computer Network Emergency Response Technical Team/Coordination Center of China, which said improper installation and configuration of the tool could create security vulnerabilities.
OpenClaw’s ability to operate autonomously requires high-level system permissions, a design feature that increases the potential impact of misuse or exploitation.
Officials warned such careless deployment inside office environments could allow attackers to gain access to sensitive systems.
This is even more risky when organizations fail to configure endpoint protection tools correctly or overlook existing firewall safeguards.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsors