<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>OpenClaw on R4shSec</title><link>http://r4shsec.is-a.dev/tags/openclaw/</link><description>Recent content in OpenClaw on R4shSec</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>r4shsec@protonmail.com (R4shSec)</managingEditor><webMaster>r4shsec@protonmail.com (R4shSec)</webMaster><copyright>© 2026 R4shSec | Theme inspired by VA-11 HALL-A © Sukeban Games</copyright><lastBuildDate>Thu, 05 Feb 2026 21:01:52 +0800</lastBuildDate><atom:link href="http://r4shsec.is-a.dev/tags/openclaw/index.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw RCE Vulnerability — WriteUp</title><link>http://r4shsec.is-a.dev/posts/i_hacked_openclaw/</link><pubDate>Thu, 05 Feb 2026 21:01:52 +0800</pubDate><author>r4shsec@protonmail.com (R4shSec)</author><guid>http://r4shsec.is-a.dev/posts/i_hacked_openclaw/</guid><description>This is a full public disclosure by @r4shsec highlighting the security vulnerabilities with the viral AI, OpenClaw, involving Remote Code Execution (RCE) and config file leak.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="http://r4shsec.is-a.dev/posts/i_hacked_openclaw/feature.png"/></item></channel></rss>