{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Threat Talks - Your Gateway to Cybersecurity Insights","title":"OpenClaw and The Dark Side of Agentic AI","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/6893ecf9\"></iframe>","width":"100%","height":180,"duration":1196,"description":"Your biggest threat this year isn’t malware. It’s your own AI assistant.OpenClaw connects an LLM directly to your terminal, browser, email, and chat. It runs with your permissions. It executes tasks without hesitation.Days after launch, researchers found a One-Click RCE.Cisco called it a security nightmare.Gartner called it an unacceptable risk.OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.OpenClaw is powerful. It’s useful.It’s also proof that many of us are not ready for AI agents with this level of autonomy. Before you let an AI agent into your systems, understand what happens when it runs unchecked.TimestampsKey Topics Covered·         How OpenClaw works and why agentic AI changes the security model·         The One-Click RCE and what it reveals about AI agent security·         Malicious skills, default allow design, and autonomous privilege abuse·         Realistic mitigation strategies including sandboxing and controlled environmentsResources·         Threat Talks: https://threat-talks.com/ ·         ON2IT (Zero Trust as a Service): https://on2it.net/ ·         AMS-IX: https://www.ams-ix.net/ams Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques. 🔔 Follow and Support our channel! 🔔 ===  ► YOUTUBE:    / @threattalks  ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...► APPLE: https://podcasts.apple.com/us/podcast... 👕 Receive your Threat Talks T-shirthttps://threat-talks.com/ 🗺️ Explore the Hack's Route in Detail...","thumbnail_url":"https://img.transistorcdn.com/zxiRQtIn39fLuEqIC458HdYTjdufBy-QMdJtCYFz97Y/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xN2Q1/NGE1NjBhYWY0ZmY5/NzEyODA5OGU3NDdi/MmNmYi5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}