OpenClaw's founder sent a letter confirming that the 360 had found a loophole

On 22 March, journalists were informed that the 360 Safety Clouds team had received an official e-mail from Peter, founder of OpenClaw. In his reply, Peter formally confirmed that OpenClaw Gateway WebSocket, discovered by the 360 team ' s exclusive owner, did not have a certified upgrade loophole. The high-risk loophole has now been synchronized by 360 to the National Information Security Gap Sharing Platform (CNVD) to assist in cutting the source of risk at the first hour of the network. The non-certification upgrade of WebSocket, which was identified this time as a zero-day (0Day) loophole, could be used by the assailants to pass through WebSocket's authority through silently and gain control of the smarts gateway, which could lead to the depletion or total collapse of target system resources. Beijing Business Journal

Search