<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Moltbot, now commonly discussed alongside the OpenClaw project, is part of a fast moving wave of agentic AI tooling designed to do real work on a user’s behalf. Instead of answering a question and stopping, an agent can connect to apps, pull data from services, run commands, and chain actions together. That convenience is exactly what turns Moltbot into a <a href="https://www.tenable.com/blog/agentic-ai-security-how-to-mitigate-clawdbot-moltbot-openclaw-vulnerabilities" rel="noopener" target="_blank">security discussion</a>, because the agent sits at the intersection of productivity and privileged access.&nbsp;<span></span></p> <!--more--><h3><strong>Why Moltbot creates real security implications</strong></h3> <p>Agent frameworks expand risk in a few predictable ways.</p> <p>First, the permissions are the product. If an agent can read files, access mail, talk to collaboration tools, and execute tasks, then compromise, misuse, or simple misconfiguration can expose the same sensitive assets your staff relies on every day. Multiple security teams have highlighted how agentic workflows amplify familiar problems like prompt injection, credential exposure, and unsafe tool execution.<span> </span></p> <p>Second, ecosystems become distribution channels. <a href="https://snyk.io/articles/clawdhub-malicious-campaign-ai-agent-skills/" rel="noopener" target="_blank">Several researchers</a> have reported malicious activity in the broader OpenClaw skills ecosystem, including malware delivered through skill content and social engineering patterns that trick users and agents into running unsafe commands. This is a classic supply chain problem, except the target is an always-on assistant that users trust with broad access.<span> </span></p> <p>Third, data exposure can come from the surrounding services, not just the agent itself. A <a href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys" rel="noopener" target="_blank">recent example by Wiz</a> involved a misconfiguration in a backend database tied to Moltbook, a social network concept for bots, which reportedly exposed large volumes of sensitive data and keys. The lesson is simple: agent adjacent services often move fast, and fast is where security gaps appear.<span> </span></p> <h3><strong>The practical takeaway for defenders</strong></h3> <p>Even if you never deploy Moltbot in your enterprise, your users can. Even if your users never install Moltbot, they can still use Claude directly through web access, desktop apps, or API based tooling. From a network controls perspective, what matters is not the brand name of the agent, it is the underlying service being accessed and the risk posture your organization has decided is acceptable.</p> <p>That is where Protective DNS shines. It gives you a clean, proactive control point: resolve or do not resolve, connect or do not connect.</p> <h3><strong>ThreatSTOP protections that address Claude use on the network</strong></h3> <p>ThreatSTOP maintains two dedicated targets that organizations can use to detect and prevent Claude use across their environments:</p> <ul> <li>Claude AI Detection Domains</li> <li>Claude AI Detection IPs</li> </ul> <p>These targets are designed to protect networks by identifying and stopping access paths associated with Claude, whether usage is direct, embedded inside a tool, or routed through an agent framework such as Moltbot.</p> <p>It is important to be explicit about what this means. Because Moltbot can be configured to use Claude in the cloud, blocking Claude blocks that Moltbot configuration. At the same time, these targets are broader by design: they aim to cover all Claude usage, not only Moltbot. That broader coverage is what makes the protection operationally useful.</p> <h3><strong>How Protective DNS applies the protection</strong></h3> <p>Protective DNS includes DNS Defense Cloud and DNS Defense.</p> <p>With DNS Defense Cloud, your users rely on ThreatSTOP managed DNS servers in the cloud. When a device attempts to resolve a Claude related domain, the request is evaluated against ThreatSTOP intelligence and the configured targets. If the request matches, the resolution is proactively stopped at the DNS layer, preventing the connection from ever being established.</p> <p>With DNS Defense, the same intelligence and targets are applied while the customer keeps DNS infrastructure on their own network. This approach supports environments where policy control and internal DNS ownership are requirements, while still receiving continuously updated protections curated by the ThreatSTOP Security, Intelligence, and Research team.</p> <p>In both models, DNS becomes a prevention layer that is easy to reason about and hard to bypass accidentally. That matters for agentic AI, where a single automated workflow can create repeated outbound activity at scale.</p> <h3><strong>How IP Defense complements DNS controls</strong></h3> <p>Some environments also want protections at the IP enforcement layer, especially where security controls are implemented on routers, firewalls, IPS platforms, and cloud enforcement points such as AWS WAF&nbsp;systems. IP Defense extends ThreatSTOP protections to IP based block lists so you can apply the same intent, prevent unauthorized Claude access, across IP enforcement points.</p> <p>This layered approach matters because real world usage patterns vary. Some clients will see the story in DNS first, others will prefer to enforce at the network edge, and many will do both.</p> <h3><strong>What this means for Moltbot specifically</strong></h3> <p>If a user runs Moltbot configured to use Claude, the activity must reach Claude infrastructure to function. In practice, a policy that detects and prevents Claude access will also detect and prevent that Moltbot configuration.</p> <p>At the same time, security programs should avoid over focusing on one tool name. The bigger risk category is agentic AI paired with powerful permissions, rapid ecosystem growth, and optional skill extensions. The safer strategy is to define a clear policy for AI services, then use Protective DNS and IP Defense to implement that policy consistently across all networks and endpoints.</p> <h3><strong>Extending visibility and protection beyond Claude with Application Control Bundles</strong></h3> <p>Claude and Moltbot are not isolated cases. They represent a broader shift toward AI services becoming embedded across workflows, developer tools, browsers, collaboration platforms, and automation frameworks. As organizations evaluate risk, most quickly realize the challenge is not managing one AI provider, but managing many, often with inconsistent visibility and controls.</p> <p>ThreatSTOP addresses this through our Application Control Bundles. These bundles extend Protective DNS and IP Defense coverage beyond a single AI platform, allowing organizations to apply consistent policy across a wide range of AI services and emerging tools. &nbsp;Many AI platforms can be blocked using the selections inside Application Control. &nbsp;<span style="font-weight: bold;">We do not recommend turning on&nbsp;<em>everything</em> in Application Control. &nbsp;Be selective.</span></p> <p>Application Control Bundles provide protections for categories such as generative AI platforms, developer assistants, automation services, and data processing APIs. This allows security teams to detect, allow, restrict, or prevent access to entire classes of applications rather than reacting tool by tool as new services appear.</p> <p>From an operational perspective, this approach delivers three important advantages.</p> <p>First, it reduces policy sprawl. Instead of chasing individual domains as new AI services gain popularity, organizations can rely on curated bundles maintained by the ThreatSTOP Security, Intelligence, and Research team. These bundles evolve as the ecosystem evolves.</p> <p>Second, it supports intentional enablement. Many organizations want to allow specific AI services for specific roles while restricting others. Application Control Bundles make it possible to design policies that support approved innovation while still protecting sensitive environments.</p> <p>Third, it strengthens prevention at scale. Whether protections are enforced through DNS Defense Cloud, DNS Defense on customer owned infrastructure, or IP Defense at network enforcement points, the same intelligence and intent applies consistently.</p> <p style="line-height: normal; font-variant-emoji: normal;">Our partnership with Glasswing.ai is crucial for maintaining true control over over 4000 distinct AI services. This partnership enables us to evaluate and prevent unauthorized access to AI services across the corporate network. &nbsp;See <a href="/blog/glasswing-ai-and-threatstop-announce-strategic-partnership-to-revolutionize-enterprise-ai-vendor-management-and-security" rel="noopener" target="_blank">our press release</a> for further information.</p> <h3><strong>Building a pragmatic policy around agentic AI</strong></h3> <p>Organizations are taking a range of positions, from full allowance to strict restriction. Many are choosing a middle path:</p> <ol> <li>Allow approved AI services for approved roles and devices</li> <li>Restrict unapproved AI services by default</li> <li>Monitor for new usage, then tune policy as workflows mature</li> <li>Require authentication controls, logging, and acceptable use guardrails for any allowed agent deployments</li> </ol> <p>ThreatSTOP helps you execute that middle path in a way that is measurable and enforceable, without turning productivity policy into an endless endpoint configuration exercise.</p> <h3><strong>Call to action</strong></h3> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our product page. <a href="/threatstop-platform" rel="noopener" target="_blank">Discover how our solutions can make a significant difference in your digital security landscape</a>. We have <a href="/pricing" rel="noopener" target="_blank">pricing for all sizes of customers</a>. Get started <a href="https://admin.threatstop.com/register?hsLang=en" rel="noopener" target="_blank">with a Demo today</a>.</p> <p>&nbsp;</p> <p style="font-weight: bold;">Connect with Customers, Disconnect from Risks</p> <h3><strong>MITRE ATT&amp;CK alignment matrix</strong></h3> <table style="border-collapse: collapse;"> <thead> <tr> <th> <p><strong>Risk or behavior discussed</strong></p> </th> <th> <p><strong>ATT&amp;CK tactic</strong></p> </th> <th> <p><strong>Relevant technique</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Agent uses web APIs for remote interaction and control</p> </td> <td> <p>Command and Control</p> </td> <td> <p>Application Layer Protocol, Web Protocols T1071.001</p> </td> </tr> <tr> <td> <p>Skills or extensions deliver malicious payloads or tooling</p> </td> <td> <p>Execution</p> </td> <td> <p>Command and Scripting Interpreter T1059</p> </td> </tr> <tr> <td> <p>Social engineering convinces user or agent to run unsafe commands</p> </td> <td> <p>Execution</p> </td> <td> <p>User Execution T1204</p> </td> </tr> <tr> <td> <p>Exposure of API keys and credentials in services or tooling</p> </td> <td> <p>Credential Access</p> </td> <td> <p>Unsecured Credentials T1552</p> </td> </tr> <tr> <td> <p>Agent driven data movement to external services</p> </td> <td> <p>Exfiltration</p> </td> <td> <p>Exfiltration Over Web Service T1567</p> </td> </tr> </tbody> </table> <p>&nbsp;</p></span>