Skip to main content

Security Model

Lite Claw is built on the principle that personal AI agents shouldn’t require trusting the internet with your credentials and access.

How Lite Claw Protects You

Zero Attack Surface

No listening ports. Outbound connections only. Nothing to find on Shodan.

Telegram Authentication

Telegram handles identity. You add a whitelist. Unauthorized users are silently ignored.

Confirmation Gates

Write operations show exactly what will happen and require a random code to confirm.

Scoped Integrations

Purpose-built tools only. No shell access. No arbitrary web browsing.

Architecture

Security architecture diagram showing Railway cloud container with Agent, connecting outbound only to Telegram API, which connects to your whitelisted phone

Defense Layers

1. No Exposed Ports

Lite Claw uses Telegram’s long polling — it connects outbound to Telegram’s servers and waits for messages. There’s no listening port, no webhook endpoint, nothing for attackers to probe. What this means:
  • Nothing to find on Shodan
  • No direct attack surface
  • All requests go through Telegram’s infrastructure

2. Authentication via Telegram + Whitelist

Telegram handles user authentication. We add:
  • Whitelist: Only approved Telegram user IDs can interact
  • Owner claim: First owner must use a secret claim code
  • Silent ignore: Unauthorized users get no response (no information leakage)

3. Tiered Permissions

Not all actions are equal. We use a tier system:
TierSensitivityConfirmationExamples
0Read-only, publicNeverweather
1Read-only, personalNevercalendar read, gmail read
2Write, non-sensitiveAlwayscreate calendar event
3Financial/sensitiveAlwaysbank statements

4. Confirmation Gates

Write operations require explicit user confirmation with a random code:
Agent: I'll create this event:
       Title: Dentist appointment
       When: Friday, Feb 14, 2:00pm
       Calendar: Personal (Google)

       Reply YES 482193 to confirm.

You: YES 482193

Agent: Done! Added to your calendar.
The random code prevents prompt injection attacks from auto-confirming actions. An attacker can trick the agent into proposing an action, but can’t trick you into confirming it.

5. Scoped Integrations

Instead of full browser/shell access, we use purpose-built integrations:
  • Google Calendar (read/write with confirmation)
  • Gmail (read-only)
  • Weather (read-only)
  • No arbitrary web browsing
  • No shell access
  • No file system access

6. Token Encryption

All OAuth tokens are encrypted at rest using AES-256-GCM with a 32-byte key. The key is stored in environment variables, never in the database.

Webhook Security

This section only applies if you deploy to Vercel, Lambda, or Modal (webhook mode). Railway uses long polling and has no exposed endpoints.
If using webhook mode, additional protections are required:

Secret Token Verification

Telegram sends a secret header with each webhook request:
X-Telegram-Bot-Api-Secret-Token: <your_secret>
Your server must reject any request without an exact match.

Unguessable Webhook Path

Place the handler behind an unguessable path:
/api/telegram/<random-32-char-string>
This reduces scanning traffic but does not replace header verification.

Owner Claim Protection

Even with header verification, anyone can find your bot and send /start. Protect with:
  • OWNER_CLAIM_CODE: First user must send /claim <code> to become owner
  • OWNER_TELEGRAM_ID: Explicitly set the owner ID, skip claim flow

Prompt Injection Defenses

Prompt injection cannot be fully eliminated, but we reduce risk through layered defenses:
LayerHow it helps
No general web accessCan’t load arbitrary pages with injections
Scoped toolsInjection limited to allowed tools
Confirmation promptsHuman approves sensitive actions
Code-based confirmationRandom codes prevent auto-confirm attacks

Sensitive Data Handling

RiskMitigation
Data sent to LLM providerAccept or use zero-retention providers
Data accumulationAuto-delete after N days
Log exposureScrub logs, short retention
Token storageEncrypted at rest with TOKEN_ENCRYPTION_KEY

Why Not OpenClaw?

OpenClaw and similar agents expose significant attack surface by default:
ConcernOpenClawLite Claw
Exposed ports18789, 18791None
AuthenticationOptionalRequired (Telegram + whitelist)
Credential storagePlaintext filesEncrypted + secret manager
Shell accessFullNone
Browser accessFullNone
Write confirmationNoneRequired with random code
First-owner protectionNoneClaim code required
In February 2026, Gartner warned that OpenClaw’s default configuration poses “unacceptable cybersecurity risk” due to plaintext credential storage and lack of authentication.