{"id":50742,"date":"2026-03-09T11:38:52","date_gmt":"2026-03-09T03:38:52","guid":{"rendered":"https:\/\/www.1ai.net\/?p=50742"},"modified":"2026-03-09T11:38:52","modified_gmt":"2026-03-09T03:38:52","slug":"%e3%80%8cai-%e5%85%bb%e9%be%99%e8%99%be%e3%80%8d%e8%b5%b0%e7%ba%a2%e8%83%8c%e5%90%8e%ef%bc%8c%e5%b7%a5%e4%bf%a1%e9%83%a8%e7%82%b9%e5%90%8d-openclaw-%e5%ae%89%e5%85%a8%e9%9a%90%e6%82%a3","status":"publish","type":"post","link":"https:\/\/www.1ai.net\/en\/50742.html","title":{"rendered":"\"AI Lobster Feeder\" is behind the red"},"content":{"rendered":"<p>9 MARCH, ACCORDING TO PRESS REPORTS, THE MINISTRY OF INDUSTRY AND INFORMATION TECHNOLOGY ' S INTERNET SECURITY THREATS AND GAP INFORMATION SHARING PLATFORM RECENTLY MONITORED THE DISCOVERY OF THE OPEN SOURCE AI SMART TOOL <a href=\"https:\/\/www.1ai.net\/en\/tag\/openclaw\" title=\"[See articles with [OpenClaw] label]\" target=\"_blank\" >OpenClaw<\/a> Some of these examples are characterized by high security risks in the context of default or inappropriate configuration, which can easily trigger security issues such as cyberattacks and information leaks\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-50743\" title=\"ef7ed73j00tbm4rm001bd000sg00izm\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2026\/03\/eef7ed73j00tbm4rm001bd000sg00izm.jpg\" alt=\"ef7ed73j00tbm4rm001bd000sg00izm\" width=\"1024\" height=\"683\" \/><\/p>\n<p><a href=\"https:\/\/www.1ai.net\/en\/tag\/%e5%b7%a5%e4%bf%a1%e9%83%a8\" title=\"[Sees articles with tags]\" target=\"_blank\" >Ministry of Industry and Information Technology<\/a>It is noted that OpenClaw has a problem of \" blurring the boundaries of trust \" at the time of its deployment and has the characteristics of autonomous and continuous operation, autonomous decision-making, mobilization systems and external resources\u3002<\/p>\n<p>In the absence of effective authority controls, audit mechanisms and security enhancements, the tool may be induced, configured or taken over in bad faith, leading to ultra vires operations, creating a range of security risks, such as information leaks, system control, etc\u3002<\/p>\n<p>In response to the above-mentioned risks, the Ministry recommends that the relevant units and users, when deploying and applying OpenClaw, fully verify public network exposures, delegation of authority and voucher management, close unnecessary public network access and improve security mechanisms such as identification, access control, data encryption and security audits, while keeping an eye on official security announcements and recommendations for strengthening\u3002<\/p>\n<p>Also at the Chinese New Longitude, in response to the \"crawling lobster\" phenomenon, Wang Jian, a member of the National Political Consultative Council and a member of the Chinese Engineering College, said in an interview that he would like to be able to raise lobsters<strong>It'll be cheap and popular soon<\/strong>No one in any industry would have missed OpenClaw\u3002<\/p>\n<p>In his statement, the representative of the National People's Congress, Koven, a Chinese engineer, also quoted Ma Zhuteng as saying that he had not even thought that the lobster would burn to this extent. I'm sorry<\/p>","protected":false},"excerpt":{"rendered":"<p>According to news reports on 9 March, the recent monitoring of the Ministry of Industry and Information Technology ' s Internet security threats and loopholes information-sharing platform found that some examples of open-source AI smart body tool OpenClaw were subject to high security risks, either by default or inappropriately configured, and were highly vulnerable to such security issues as cyberattacks and information leaks. According to the Ministry of Industry and Communications, OpenClaw has a problem of \"blank trust borders \" at the time of its deployment and has the characteristics of autonomous and continuous operation, autonomous decision-making, mobilization systems and external resources. In the absence of effective authority controls, audit mechanisms and security enhancements, the tool may be induced, configured or taken over in bad faith, leading to ultra vires operations, creating a range of security risks, such as information leaks, system control, etc. In response to the above-mentioned risks, the letter of work<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148,146],"tags":[8229,1429],"collection":[],"class_list":["post-50742","post","type-post","status-publish","format-standard","hentry","category-headline","category-news","tag-openclaw","tag-1429"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/50742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/comments?post=50742"}],"version-history":[{"count":0,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/50742\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/media?parent=50742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/categories?post=50742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/tags?post=50742"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/collection?post=50742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}