Vigyata.AI
Is this your channel?

Your OpenClaw Hostinger VPS Setup Is NOT Secure — Fix It Step by Step

2.3K views· 86 likes· 23:57· Feb 25, 2026

🛍️ Products Mentioned (3)

OpenClaw security tutorial — Is OpenClaw safe? We fix critical OpenClaw vulnerabilities, lock down HTTP access, and resolve security audit findings (including CVE-level risks) on a Hostinger VPS Docker deployment. With recent headlines around OpenClaw vulnerabilities, OpenClaw risks, and OpenClaw CVE findings, many people are asking: 👉 Is OpenClaw safe to run on a VPS? In this episode, I run a full OpenClaw security audit, identify critical findings (including insecure HTTP Control UI exposure), and show you step-by-step how to harden your OpenClaw VPS deployment — going from 1 critical + 3 warnings to 0 critical, 0 warnings. Even if you have zero technical background, I explain every command in plain English so you know what you're doing and not just copy-pasting blindly. By the end, your OpenClaw setup will have: ✔ 0 Critical findings ✔ 0 Warning findings ✔ Locked-down local-only gateway access (no more public HTTP) ✔ Device authentication enforced ✔ Auth rate limits configured ✔ File permissions tightened with chmod ⸻ 📋 What This Video Covers (OpenClaw VPS Security Hardening) • What OpenClaw is and why people deploy it on a VPS instead of a personal machine • The VPS vs Docker "building vs studio" mental model • One-click OpenClaw deploy on Hostinger using Docker Manager • Why the default HTTP access is a critical security risk (the "clear plastic envelope" problem) • Running openclaw security audit inside the Docker container • Fixing insecure HTTP / Control UI exposure • Editing Docker Compose YAML to bind ports to 127.0.0.1:18789 • Port forwarding configuration and container restart • SSH tunnelling from your local terminal to access the gateway securely • Enabling device identity and approving devices via openclaw devices approve • Disabling "Dangerously Disabled Control UI Device Auth" • Disabling the "Insecure Control UI" toggle • Configuring gateway auth rate limits (max attempts, window, lockout) • Tightening file permissions using chmod 600 and chmod 700 • Re-running the audit to confirm all critical and warning findings are resolved ⸻ ⏱️ Timestamps: 00:00 OpenClaw VPS Security 00:41 What Is OpenClaw 01:36 One-Click VPS Deploy on Hostinger 03:53 Docker Containers Explained 05:13 OpenClaw HTTP Risk 07:35 How to Run OpenClaw Security Audit in Docker 09:45 Fix OpenClaw Ports 11:58 Port Forwarding and Restart 14:15 SSH Tunnel to OpenClaw Gateway (Secure Access) 17:35 Enable OpenClaw Device Auth and Pairing 20:34 Fix OpenClaw Warnings 23:15 Wrap-Up and Next Steps — SSH Hardening for VPS Security 📹 Related Videos https://www.youtube.com/watch?v=fB2xv7rLqME&feature=youtu.be 🔗 Helpful Links: Step-by-step & code doc: https://docs.google.com/document/d/1maBpTb8EB8n7b7V-Zm_NsD9fS2uHWWSAh1t5BhC0P_Y/edit?usp=sharing Hostinger Openclaw One-Click Deployment: https://www.hostinger.com/vps/docker 💡 Connect with me: Instagram: / automatewithmarc LinkedIn: / marconi-darmawan Email: automatewithmarc@gmail.com ☕️ Buy me Coffee: https://buymeacoffee.com/automatewithmarc #openclaw

🎬 More from Automate with Marc | AI Automation