Who can trigger the bot
Pairing, allowlists, and mention gating reduce who gets to talk to the agent in the first place.
OpenClaw intake safety
OpenClaw’s own security docs make the key point clearly: prompt injection does not only come from who can message the bot. It can also arrive through web pages, fetched URLs, browser content, emails, documents, attachments, and pasted material. Veridicus Scan is the intake layer for that risk: scan suspicious pages and files locally, review the report, then decide what OpenClaw gets to see.
The actual risk model
If OpenClaw can read a page, document, attachment, or pasted block of text, then that content can attempt to steer the model. Once tools are available, the problem moves from “bad text” to “bad text with agency.”
Pairing, allowlists, and mention gating reduce who gets to talk to the agent in the first place.
Fetched pages, suspicious files, and pasted instructions can all carry adversarial content even when the human sender is trusted.
The wider the tool surface, the more damaging a successful prompt-injection path becomes.
Why Veridicus Scan belongs in the loop
Veridicus Scan is not a replacement for OpenClaw’s own security controls. It is the product that gives you a local review step before those controls ever need to react. Scan the content, read the report, then decide whether it should enter the OpenClaw workflow at all.
Hardening checklist
OpenClaw already documents the hardening basics. The gap is usually at the content boundary, which is why the pre-scan step matters so much when web and file inputs are involved.
Keep DMs paired or allowlisted, and prefer mention gating instead of always-on group behavior.
Do not expose exec, browser, web_fetch, or web_search broadly if the agent reads untrusted content.
Run openclaw security audit --deep and keep sandboxing on where the model can otherwise reach sensitive local tools or files.
Use Veridicus Scan on suspicious pages and documents before they become prompt context, uploaded content, or agent-readable attachments.
What to scan first
This list stays grounded in the actual Veridicus Scan surface. The app is strongest when you use it on web pages and documents before they cross the agent boundary.
Use strict redirect handling when the destination boundary matters and you do not want a tool-enabled flow to follow the wrong page.
Inspect hidden styles, metadata anomalies, parser-visible content, and export a report before the file is uploaded into an agent workflow.
If you need repeatable local workflows, use Veridicus Scan’s premium MCP path as the scan step rather than letting unreviewed content jump straight into agent execution.
Build the safer stack
Use OpenClaw for the agent runtime and Veridicus Scan for the intake decision whenever URLs, documents, or pasted material should be treated as untrusted.