PANews reported on March 22 that, according to Jinshi, to help users use OpenClaw securely, the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) and the China Cybersecurity Association jointly released a practical guide for the secure use of OpenClaw on March 22. The guide offers security protection suggestions for ordinary users, enterprise users, cloud service providers, and technology developers. For ordinary users, the suggestions include: installing OpenClaw on dedicated devices, virtual machines, or containers, ensuring proper environment isolation, and avoiding installation on everyday office computers; not running OpenClaw with administrator or superuser privileges; not storing or processing private data in the OpenClaw environment; and promptly updating to the latest version of OpenClaw. For cloud service providers, the suggestions include conducting security assessments and hardening of the basic security layer of cloud servers; deploying and integrating security protection capabilities; and ensuring supply chain and data security.


