February 27, 2026 · 5 min read
Ollama 0.17 just shipped native OpenClaw integration with web search out of the box. Two commands and you have a personal AI agent running on your machine with local models.
This is great for adoption. It's terrifying for security.
What Ollama 0.17 Does
Ollama's latest release lets you set up OpenClaw to work with open models (Llama, Mistral, DeepSeek, etc.) and web search. No cloud API keys needed. Fully local inference.
ollama launch openclaw
That's it. One command. You now have an AI agent that can:
- Send emails on your behalf
- Manage your calendar
- Read and write files on your machine
- Execute shell commands
- Search the web
- Connect to WhatsApp, Telegram, iMessage
All running with your user permissions. On your actual machine.
Why This Is a Security Problem
⚠️ The Ollama + OpenClaw combo inherits every OpenClaw vulnerability. Local models don't fix host-level security.
Running local models solves one problem (data doesn't leave your machine) but creates a false sense of security. Here's what's still exposed:
1. Your Entire Filesystem
The agent runs as your user. It can read ~/.ssh, ~/.aws, browser cookies, crypto wallets, tax documents — everything you can access.
2. The WebSocket Hijack (CVE-2026-25253)
OpenClaw's gateway listens on localhost WebSocket. Oasis Security proved any website can brute-force the port and take full control of your agent. Local models don't change this — the gateway architecture is the same.
3. Prompt Injection via Web Search
Ollama 0.17 adds web search. That means the agent fetches content from the internet and processes it. A malicious webpage can embed prompt injection payloads that hijack the agent's behavior. Now your "local" agent is executing attacker instructions.
4. Skill Supply Chain
OpenClaw skills are npm packages or GitHub repos. 341+ malicious skills have been documented. A compromised skill runs with full access to your system.
5. No Permission Boundaries
OpenClaw has no concept of "this agent can read files but not execute commands" or "this agent can access the calendar but not SSH keys." It's all-or-nothing.
The One-Click Problem
When something is easy to install, people don't think about security. Ollama's user base is developers and tinkerers who want to run AI locally — they're not enterprise security teams. They'll run ollama launch openclaw, connect it to WhatsApp, and forget about it.
Microsoft: "OpenClaw should be treated as untrusted code execution with persistent credentials. It is not appropriate to run on a standard personal or enterprise workstation."
Now Ollama is making it trivial to do exactly what Microsoft says not to do.
How to Secure Your Ollama + OpenClaw Setup
✅ ClawMoat adds the security layer that Ollama + OpenClaw are missing.
npm install -g clawmoat
1. Set Up Permission Tiers
const { HostGuardian } = require('clawmoat');
const guardian = new HostGuardian({
mode: 'standard', // observer → worker → standard → full
workspace: '~/openclaw-workspace',
forbiddenZones: ['~/.ssh', '~/.aws', '~/.gnupg'],
});
2. Monitor Network Egress
const { NetworkEgressLogger } = require('clawmoat');
const logger = new NetworkEgressLogger();
// Blocks requests to cloud metadata, private IPs, known-bad domains
// Alerts on unusual outbound connections
3. Scan Skills Before Installing
# Audit all installed skills for suspicious patterns
npx clawmoat skill-audit ~/.openclaw/skills/
4. Detect WebSocket Hijack Attempts
const { GatewayMonitor } = require('clawmoat');
const monitor = new GatewayMonitor();
// Detects brute-force port scanning, suspicious WS origins,
// unauthorized device pairing attempts
5. Protect Financial Data
const { FinanceGuard } = require('clawmoat');
const guard = new FinanceGuard();
// Blocks access to crypto wallets, banking files, tax documents
// Redacts financial secrets in agent output
The Bottom Line
Ollama 0.17 is going to put OpenClaw on thousands of new machines. Most of those machines won't have any security layer between the agent and the host.
If you're going to run OpenClaw — with Ollama or otherwise — run it with a security moat.
⭐ Star on GitHub Get Started Free
ClawMoat is open-source (MIT), zero dependencies, 277 tests passing. Works with any OpenClaw deployment — cloud, local, or Ollama.