⚠ Active exploits targeting Moltbot users — Feb 2026

Your AI agent is running naked.
Give it armor.

BlastCage isolates your AI agent's execution from your credentials, memory, and files using hardware-separated Clean/Dirty zone architecture. Open source core.

Get Early Access → View on GitHub
The Problem
Moltbot gives your agent the keys to everything.
Full shell access, browser credentials, API keys stored in plaintext, persistent memory that can be poisoned — and hundreds of admin panels exposed to the internet without authentication.
CVE-2026-25253 / CVE-2026-25157

Remote Code Execution

Chained vulnerabilities allow attackers to execute arbitrary commands on the host with user-level permissions.

CREDENTIAL EXPOSURE

Plaintext Secrets

API keys, OAuth tokens, and user profiles stored in plaintext Markdown and JSON files under ~/.clawdbot/

PERSISTENT MEMORY

Delayed Poison Attacks

Malicious instructions hidden in a forwarded WhatsApp message persist in memory for weeks, enabling delayed multi-turn attack chains.

SUPPLY CHAIN

Malicious Skills

Hundreds of backdoored skills on ClawHub. One proof-of-concept was downloaded by 16 developers in 7 countries within 8 hours.

Containment Principle
The danger is inside. The world stays clean.
Move your cursor inside the cage — you are the compromised agent. Blast outward. The gateway mesh absorbs every escape attempt.
enter the cage to begin
The Architecture
Separate what's dangerous from what's valuable.
BlastCage splits your agent into isolated zones. Even if the execution environment is fully compromised, your credentials, memory, and completed work remain untouched.
Server B — Clean Zone
No external network interface. All data encrypted at rest. Credentials managed by Vault with HSM keys.
🧠 Orchestrator 🔐 Memory Vault 📦 Artifact Store 🔑 Credential Vault
mTLS + signed instructions + schema validation
Deterministic Filter Gateway
The Faraday cage. Non-AI rule engine. JSON Schema enforcement. Short-lived token proxy. Tamper-evident audit log.
mTLS + allowlist egress + sequence numbers
Server A — Dirty Zone (Ephemeral)
⚠️ Assumed compromised at all times. No persistent state. No long-lived credentials. Destroyed after each task.
🤖 Agent Runtime 🌐 Web/API Access 📝 Temp Workspace
Attack Coverage
What we stop — and what we can't.
We're transparent about our coverage. No security product stops everything. Our goal is reducing the blast radius from total system compromise to a single ephemeral session.
Attack VectorDefault MoltbotWith BlastCageHow
Exposed admin panelsVULNERABLEBLOCKEDB has no external ports. A has no persistent admin UI.
Plaintext credential theftVULNERABLEBLOCKEDCredentials in encrypted Vault on B. A only gets short-lived tokens.
Auth bypass via reverse proxyVULNERABLEBLOCKEDB exposes zero network ports. No auth to bypass.
Persistent memory poisoningVULNERABLEBLOCKEDA has no persistent memory. Memory lives in B, unreachable from A.
Info-stealer malwareVULNERABLEBLOCKEDNothing to steal on A. No credentials, no history, VM destroyed after task.
RCE (CVE-2026-25253)FULL COMPROMISECONTAINEDRCE lands in ephemeral sandbox with no credentials and allowlist egress.
Malicious skills/pluginsFULL COMPROMISECONTAINEDMalicious code runs in sandbox. Cannot reach B's data or exfiltrate to non-allowlisted hosts.
Indirect prompt injectionFULL COMPROMISEMITIGATEDCannot prevent injection, but blast radius limited to single session with no credentials.

⚡ Honest disclaimer

No architecture can fully prevent indirect prompt injection — it's a fundamental limitation of current LLM technology. What we do is reduce the blast radius: a successful attack on a default Moltbot gives the attacker everything. A successful attack through BlastCage gives them access to one ephemeral container with no credentials, no memory, no files, and an egress allowlist — for the duration of a single task.

Pricing
Open source core. Managed option for everyone else.
The isolation architecture is fully open source. The managed service handles deployment, updates, monitoring, and key management so you don't have to.
Open Source
Free
Self-hosted. You manage the infrastructure.
  • Full Clean/Filter/Dirty architecture
  • Docker Compose deployment
  • Basic filter rules
  • Community support via GitHub
  • Bring your own server(s)
View on GitHub
Early Access
Get notified when we launch.
Founding members get locked-in pricing and priority access to the managed service.
No spam. We'll email you once when the managed service is ready.
✓ You're on the list. We'll be in touch.
FAQ
Common questions.
What is BlastCage?

BlastCage is an open-source trust-zone isolation architecture for AI agents. It separates agent execution (the "Dirty Zone") from your credentials, memory, and files (the "Clean Zone") using a deterministic filter gateway. Even if the agent's runtime is fully compromised, the attacker gets nothing of value.

How does BlastCage protect my credentials?

Credentials live in an encrypted Vault on Server B (Clean Zone), which has no external network interface. The AI agent on Server A (Dirty Zone) never sees raw credentials — it only receives short-lived, scoped tokens through the filter gateway. When the task ends, the Dirty Zone is destroyed.

Does BlastCage prevent prompt injection?

No architecture can fully prevent indirect prompt injection — it's a fundamental limitation of current LLM technology. What BlastCage does is reduce the blast radius: a successful injection gives the attacker access to one ephemeral container with no credentials, no memory, no files, and an egress allowlist — for the duration of a single task.

Can I self-host BlastCage?

Yes. The full Clean/Filter/Dirty architecture is open source and ships as a Docker Compose project. You can deploy it on your own servers. The managed service ($9/month for founding members) handles deployment, updates, monitoring, and key management for you.

What's the difference between BlastCage and running my agent in Docker?

Docker isolates processes, but a containerized agent still has access to mounted credentials, persistent memory, and unrestricted egress. BlastCage enforces three-zone hardware separation: the agent's runtime physically cannot reach the credential store, and all communication passes through a deterministic (non-AI) filter gateway with JSON Schema enforcement and allowlist egress.