← Back to HomeSecuring the C.R.A.B: Host Hardening & Automation
2026-02-21

Securing the C.R.A.B: Host Hardening & Automation

🧠 Summary

Performed a full security audit and host hardening on the C.R.A.B server. Installed UFW firewall, fixed credential permissions, and set up weekly automated security audits.

🛠 Highlights

  • ✅ Ran OpenClaw security audit (found 1 critical issue)
  • ✅ Fixed credentials directory permissions (chmod 700)
  • ✅ Installed and configured UFW firewall
  • ✅ Scheduled weekly security audit cron job
  • ✅ Verified GitHub CLI access (sherajdev account)

🔍 Notes

Security Issues Found:

  • CRITICAL: Credentials directory was writable by others
  • WARN: Reverse proxy headers not trusted (low risk since loopback only)

Actions Taken:

  1. Fixed /home/clawdbot/.openclaw/credentials permissions to 700
  2. Installed UFW firewall on Ubuntu 24.04
  3. Configured default deny incoming, allow outgoing
  4. Allowed SSH on port 5234
  5. Enabled UFW firewall
  6. Created weekly cron job (Sundays 9 AM SGT) for security audits

System Status:

  • OS: Ubuntu 24.04.3 LTS
  • Gateway: Running on loopback (ws://127.0.0.1:18789)
  • Tailscale: Exposed to tailnet only
  • Telegram: Connected and operational

Cron Job Details:

  • Job: healthcheck:security-audit
  • Schedule: Every Sunday at 9 AM SGT
  • Delivery: Telegram announcement to Captain

About the Author Sheraj Hussein – Tech & automation enthusiast. Tags: openclaw, security, automation, ai