AI Architect Program · S2
← All sessions

Week 1 · Foundations

Building and Deploying Secure OpenClaw Agents

Date
Mon, Apr 27, 2026 · 90 min
Presenters
Tiffanie Kong · Rodrigo Hernández · Yong Tian
Slides
Download PDF · 3 MB

Summary

Week 1 set the foundation for the rest of the program: where AI agents sit on the arc from chatbots to always-on personal assistants, what an agent actually is under the hood, and what it takes to deploy one without handing the keys to the kingdom.

The agentic shift

From stateless LLMs (text in, text out) to chatbots (a UI on top of an LLM) to AI agents (LLM + memory + tools + an execution loop) to always-on personal agents (persistent, self-hosted, running 24/7 across every app you use). The line you cross when an agent has tools is the line where security stops being optional.

Agent building blocks

  • LLM (the brain) — the reasoning engine. Understands instructions, plans, makes decisions.
  • Memory (context) — short-term session context plus long-term retrieval (RAG over docs, vector store).
  • Tools (APIs / MCP) — how the agent interacts with the world: open apps, browse the web, query a DB. MCP is the "USB-C" that standardizes the connection.
  • The agentic loop — Plan → Act → Observe → Reflect → Replan, until the goal or stop condition is met.

What is OpenClaw

A self-hosted gateway that connects chat apps (WhatsApp, Telegram, Discord, Slack, Signal, iMessage) to AI agents that run 24/7. Model-agnostic. Custom permission boundaries. Part of the Claw ecosystem, which spans NemoClaw (enterprise), OpenClaw (general / cloud via BareClaw), NanoClaw (isolation-first), IronClaw (security-first), PicoClaw (embedded), ZeroClaw and NullClaw (minimal footprint).

Security foundations

Four layers, ordered by blast radius:

  1. Network isolation — VPC, firewalls, no internet egress by default.
  2. Data filtering — PII redaction, field-level masking before the model sees anything.
  3. Tool scoping — read-only by default, explicit allowlist for any write or delete.
  4. Runtime controls — approval gates, session timeouts, kill switches.

Threats worth naming

  • Open DMs let anyone trigger your agent.
  • Prompt injection comes through content (web pages, emails, attachments), not senders.
  • Group chats are wide-open by default — use @mention gating.
  • Gateway and cron tools can rewrite your config and survive restarts.
  • Session transcripts store everything on disk, including pasted secrets.
  • Plugins run in-process with full gateway access — install only from trusted sources.
  • Weak models are a security liability; saving on the model is a security tradeoff.

Before going live

  1. Run the built-in security audit immediately after install.
  2. Lock file permissions on ~/.openclaw.
  3. Set DM policy to "pairing" on every channel.
  4. Require explicit @mention in all group chats.
  5. Deny dangerous tools (gateway / cron / sessions_spawn) by default.
  6. Use strong models for any tool-enabled agent.

Discussion

Questions, follow-ups, things you built — jump into the cohort Slack.

References