Nvidia’s new NemoClaw security stack attempts to mitigate risks in the popular OpenClaw AI platform, but early testing reveals significant usability bugs and persistent architectural security vulnerabilities.
Key Points
- NemoClaw provides a sandbox environment with deny-by-default network policies and kernel-level filesystem isolation to contain OpenClaw agents.
- Users report frequent technical issues, including permission errors, dashboard connectivity failures, and complex setup requirements for local inference backends like Ollama.
- The platform fails to address semantic-level threats, such as prompt injection, which can bypass sandboxing by manipulating agents through trusted service integrations.
- Despite the security layer, the underlying architecture of OpenClaw remains flawed because it merges control and data planes, leaving users vulnerable to credential theft.
- The software is currently in an early preview stage, with many features requiring manual workarounds to function as intended.