Editorial illustration for Runlayer adds OpenClaw security, boosting prompt injection resistance to 95%
OpenClaw Prompt Attacks Expose Critical AI Security Risks
Runlayer adds OpenClaw security, boosting prompt injection resistance to 95%
Why should a CIO care about prompt injection? The risk isn’t new, but the numbers are. While many AI‑driven tools still stumble when faced with cleverly crafted inputs, Runlayer is rolling out a new security layer built around its OpenClaw platform.
The company markets the addition as “secure OpenClaw agentic capabilities for large enterprises,” promising a more disciplined defense against the kind of manipulation that can leak data or derail workflows. The suite leans on two pillars—discovery and active defense—each designed to spot anomalies before they cause harm. OpenClaw Watch, for instance, acts as a detection mechanism, constantly scanning for suspicious patterns.
Here’s the thing: Runlayer’s own testing claims a dramatic jump in resistance, moving from single‑digit percentages to near‑full protection. That claim sets the stage for the numbers that follow.
According to Runlayer's internal benchmarks, this technical layer increases prompt injection resistance from a baseline of 8.7% to 95%. The Runlayer suite for OpenClaw is structured around two primary pillars: discovery and active defense. OpenClaw Watch: This tool functions as a detection mechanism.
According to Runlayer's internal benchmarks, this technical layer increases prompt injection resistance from a baseline of 8.7% to 95%. The Runlayer suite for OpenClaw is structured around two primary pillars: discovery and active defense. OpenClaw Watch: This tool functions as a detection mechanism for "shadow" Model Context Protocol (MCP) servers across an organization.
It can be deployed via Mobile Device Management (MDM) software to scan employee devices for unmanaged configurations. Runlayer ToolGuard: This is the active enforcement engine that monitors every tool call made by the agent,. It is designed to catch over 90% of credential exfiltration attempts, specifically looking for the "leaking" of AWS keys, database credentials, and Slack tokens.
Berman noted in our interview that the goal is to provide the infrastructure to govern AI agents "in the same way that the enterprise learned to govern the cloud, to govern SaaS, to govern mobile". Unlike standard LLM gateways or MCP proxies, Runlayer provides a control plane that integrates directly with existing enterprise identity providers (IDPs) like Okta and Entra. Licensing, privacy, and the security vendor model While the OpenClaw community often relies on open-source or unmanaged scripts, Runlayer positions its enterprise solution as a proprietary commercial layer designed to meet rigorous standards.
Runlayer’s new OpenClaw layer promises a dramatic jump in prompt‑injection resistance, from a modest 8.7 % up to 95 % according to its own tests. The claim rests on internal benchmarks, not third‑party verification, so the real‑world impact remains uncertain. By wrapping OpenClaw in a discovery‑and‑active‑defense framework, Runlayer hopes to address the security concerns that have trailed the agent since its November 2025 debut. OpenClaw Watch, the detection component, is billed as a frontline alert system, yet details on its false‑positive rate or integration overhead are absent.
Enterprises are now seeing IT and security teams weigh the trade‑off between automation gains and the documented risks that have already drawn solopreneurs and employees to the tool. Could the added layer be enough to satisfy cautious CIOs? Perhaps.
Still, without external validation, the extent to which the 95 % figure translates into sustained protection is unclear. The rollout marks a noteworthy step, but the broader security picture remains to be fully mapped.
Further Reading
Common Questions Answered
How does Runlayer improve OpenClaw's prompt injection resistance?
Runlayer has developed a security layer that increases prompt injection resistance from 8.7% to 95% through a two-pillar approach of discovery and active defense. The solution includes OpenClaw Watch, a detection mechanism that can scan for unmanaged configuration servers across an organization using Mobile Device Management (MDM) software.
What are the key components of Runlayer's OpenClaw security suite?
The Runlayer suite is structured around two primary pillars: discovery and active defense. OpenClaw Watch serves as the discovery component, functioning as a detection mechanism for 'shadow' Model Context Protocol (MCP) servers across an organization's infrastructure. The active defense component aims to provide robust protection against prompt injection attacks.
What challenges does the Runlayer OpenClaw security solution still face?
While Runlayer claims a dramatic improvement in prompt injection resistance, the benchmarks are based on internal testing without third-party verification. The real-world effectiveness of the 95% resistance claim remains uncertain, leaving some skepticism about the comprehensive nature of the security solution.