Book a free strategy call — pick a time that works for you Book Now →
NemoClaw sandbox escape research by Snyk Labs and community findings

NemoClaw Sandbox Escape Research: What Snyk Labs and the Community Found

“Even with workspaceAccess set to ‘none’ or ‘ro’, the model can exfiltrate host files through /tools/invoke. The sandbox boundary is not where you think it is.”

— Snyk Labs security research, NemoClaw sandbox analysis, 2026

NemoClaw is NVIDIA’s enterprise security wrapper for agentic AI — the sandboxed runtime environment that adds kernel-level isolation, a YAML policy engine, and a privacy router to the open-source OpenClaw agent framework. It is the most serious attempt by a major vendor to solve the agent security problem. It is also in alpha. And security researchers have found that several of its isolation boundaries can be bypassed.

This article catalogs what security researchers have found, explains the technical mechanisms behind each bypass, assesses the severity for enterprise deployments, and provides the specific mitigations available today. The primary formal research comes from Snyk Labs, published as “Escaping the Agent: On Ways to Bypass OpenClaw’s Security Sandbox” (labs.snyk.io). These findings do not mean NemoClaw is broken — they mean NemoClaw is young, and the security boundaries it advertises are not yet fully enforced in all configurations. Enterprise teams deploying NemoClaw must understand these gaps and compensate with defense-in-depth measures until NVIDIA patches them.

For the full list of known NemoClaw limitations, see our What NemoClaw Cannot Fix analysis. For the audit process that verifies NemoClaw’s security controls, see our 10-Point Security Audit Checklist. For our enterprise security assessment service, see our Security Checklist page.

4 distinct bypass categories documented by researchers
Alpha NemoClaw status — “expect rough edges”
Finding 1 • Snyk Labs

The /tools/invoke Exfiltration: Bypassing workspaceAccess Restrictions

Snyk Labs — Sandbox Bypass via /tools/invoke HIGH SEVERITY

Snyk Labs demonstrated that even when workspaceAccess is set to “none” or “ro” (read-only), the model can use the /tools/invoke endpoint to read and exfiltrate files from the host filesystem. The /tools/invoke is an authenticated endpoint that fails to incorporate sandbox-specific tool policies — it checks authentication but does not enforce the workspaceAccess restrictions, providing an alternative path that bypasses the workspace access control entirely.

The attack works because /tools/invoke executes tools in a context that is not subject to the same Landlock filesystem restrictions as the agent’s main execution environment. A tool invoked through this endpoint inherits the host process’s filesystem permissions, not the sandbox’s restricted permissions. The consequences are severe: data leakage from host files or persistent tampering with the gateway host by writing to host-level configuration.

The severity is high because workspaceAccess: "none" is the configuration that enterprises deploy when they want the agent to have zero filesystem access. If this setting does not actually prevent filesystem access via /tools/invoke, the security guarantee is hollow. An attacker who achieves prompt injection against the agent can instruct it to read sensitive files through tool invocation rather than direct filesystem access.

How the Attack Works

Attack Sequence — /tools/invoke File Exfiltration
# Agent's workspace access is set to "none"
# Direct file read: BLOCKED by sandbox
Agent → read(/etc/passwd) → DENIED (Landlock)

# But /tools/invoke bypasses the sandbox boundary
Agent → POST /tools/invoke
  {
    "tool": "file_reader",
    "args": {"path": "/etc/passwd"}
  }
  → SUCCESS (tool executes outside sandbox boundary)
  → Returns file contents to agent
  → Agent includes contents in next LLM response

# The agent now has the file contents in its context
# and can exfiltrate them through any output channel

Mitigation

Until NVIDIA patches this, restrict the tools available through /tools/invoke in your YAML policy. Do not rely on workspaceAccess alone for filesystem isolation. Instead, explicitly deny all filesystem-related tools in the policy’s tools.denied list, and run NemoClaw’s host process under a restricted Linux user account with minimal filesystem permissions. This creates a defense-in-depth layer: even if the tool invocation bypasses the sandbox, the host process itself cannot read sensitive files.

nemoclaw-config.yaml — Defense-in-Depth Mitigation
sandbox:
  workspaceAccess: "none"
  tools:
    denied:
      - "file_reader"
      - "file_writer"
      - "shell_exec"
      - "*_filesystem_*"

# Additionally: run NemoClaw as a restricted user
# $ useradd -r -s /sbin/nologin nemoclaw-runner
# $ chown nemoclaw-runner:nemoclaw-runner /opt/nemoclaw/
# $ nemoclaw start --user nemoclaw-runner
Finding 2 • Race Condition

TOCTOU Race in Sandbox Path Validation

TOCTOU Race Condition — Path Validation Bypass MEDIUM SEVERITY

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in NemoClaw’s sandbox path validation. The specific mechanism involves the assertSandboxPath function, which validates that a file location falls within the allowed directory list. The attacker keeps the file at a safe location during the check, then rapidly swaps it for a symlink to a host location before the actual file operation executes.

This is a classic Unix security vulnerability. assertSandboxPath validates /tmp/safe/data.csv, confirms it is within the allowed /tmp/safe/ directory, and returns success. But between the validation call and the actual open, a symlink replaces /tmp/safe/data.csv with a pointer to /etc/shadow. The open operation follows the symlink and reads the restricted file.

The severity is medium because exploiting this requires precise timing and either a collaborating process inside the sandbox or the ability to manipulate the filesystem during the validation window. In practice, the window is measured in microseconds. But for persistent attackers with prompt injection access, the race can be attempted repeatedly until it succeeds. On a system under load where I/O operations are slower, the window is wider.

Mitigation

Mount the agent’s writable directories with nosymfollow (available on Linux 5.10+ with ext4/XFS). This prevents the kernel from following symlinks in those directories, eliminating the TOCTOU race entirely. Alternatively, use O_NOFOLLOW flags in file operations, but this requires a NemoClaw patch to change the sandbox’s open() calls. The nosymfollow mount option is the immediate mitigation you can deploy today.

Terminal — Mount with nosymfollow
# Create a dedicated filesystem for the agent's writable directory
$ mkdir -p /mnt/nemoclaw-workspace
$ mount -t tmpfs -o size=1G,nosymfollow tmpfs /mnt/nemoclaw-workspace

# Update NemoClaw config to use this directory
$ nemoclaw config set sandbox.workspace_dir "/mnt/nemoclaw-workspace"

# Verify nosymfollow is active
$ mount | grep nemoclaw-workspace
tmpfs on /mnt/nemoclaw-workspace type tmpfs (rw,nosymfollow,size=1048576k)
Finding 3 • GitHub Issue #272

Policy Preset Gap: Any Process Can Reach Allowed Endpoints

GitHub Issue #272 — Policy Preset Network Gap MEDIUM SEVERITY

NemoClaw’s policy engine allows you to whitelist network endpoints that the agent can reach. The intention is that only the agent’s authorized tools should communicate with these endpoints. But GitHub issue #272 documents that the network whitelist is applied at the network namespace level, not the process level. This means any process running inside the sandbox can reach the allowed endpoints — not just the agent’s designated tools.

If the agent is permitted to reach api.example.com:443 for a specific tool, and the agent is also able to execute arbitrary commands (through prompt injection or a permissive tool configuration), the agent can use curl, python3, or any available binary to send requests to api.example.com:443 with arbitrary payloads. The policy engine does not inspect what is sent to allowed endpoints — only whether the destination is in the whitelist.

This gap matters most in configurations where the allowed endpoint list includes external APIs. An attacker who achieves prompt injection can craft arbitrary HTTP requests to any allowed endpoint. If the allowed endpoint is a third-party API that accepts POST requests with arbitrary bodies, the attacker can exfiltrate data by encoding it in the request body to a whitelisted destination.

Mitigation

Minimize the allowed_endpoints list to the absolute minimum required. Remove any endpoint that accepts arbitrary input from external sources. Use NemoClaw’s seccomp profile to restrict which binaries can make network calls — deny curl, wget, and python3 as network-capable binaries, leaving only the specific tool binary as the sole network client. This does not fully solve the issue but reduces the attack surface from “any process” to “only the designated tool binary.”

nemoclaw-config.yaml — Restricted Network Binaries
sandbox:
  seccomp:
    network_binaries_allowed:
      - "/opt/nemoclaw/tools/market_api_tool"
    network_binaries_denied:
      - "/usr/bin/curl"
      - "/usr/bin/wget"
      - "/usr/bin/python3"
      - "/usr/bin/nc"
Finding 4 • Prompt Injection

Prompt Injection Bypass: curl/python3 POST to Allowed Endpoints

Prompt Injection — Data Exfiltration via Allowed Endpoints HIGH SEVERITY

This finding combines findings 3 and 4 into an end-to-end attack chain. A prompt injection attack instructs the NemoClaw agent to read sensitive data (via the /tools/invoke bypass in Finding 1) and then exfiltrate it by using curl or python3 to POST the data to an allowed endpoint (exploiting the policy gap in Finding 3). The agent follows the injected instructions because NemoClaw’s policy engine governs what the agent can do, not what the agent chooses to do. Prompt injection is an LLM-level vulnerability that no sandbox can fully prevent.

Penligent.ai’s analysis confirmed this attack chain works against NemoClaw in its default configuration. The r/LocalLLaMA community independently reported sandbox isolation bypasses on RTX 5090 hardware, and multiple users documented HTTP CONNECT proxy 403 errors that indicate the sandbox’s network controls are not consistently enforced across all request types.

The prompt injection bypass is the most concerning finding because it is not a bug in NemoClaw’s code — it is a fundamental limitation of the security model. NemoClaw’s sandbox controls what system resources the agent can access. It does not control what the LLM decides to do with those resources. If the LLM is tricked by a prompt injection into believing it should read and transmit a file, and the sandbox permissions allow reading that file and reaching that endpoint, the sandbox has technically not been violated — the agent is operating within its permissions. The violation is at the intent level, not the capability level.

The Fundamental Problem: Sandbox vs. Intent

A sandbox enforces capability boundaries. It answers: “Can this agent read this file?” and “Can this agent reach this endpoint?” A sandbox does not answer: “Should this agent be reading this file right now?” or “Is this data exfiltration disguised as a legitimate API call?” Answering intent-level questions requires output monitoring, behavioral analysis, and anomaly detection — layers that NemoClaw does not currently provide. This is not unique to NemoClaw; no current AI agent sandbox solves the prompt injection problem at the sandbox level.

Combined Mitigation Strategy

  1. Minimize permissions. Apply the principle of least privilege ruthlessly. Every tool, filesystem path, and network endpoint in the policy should be justified. If an agent does not need network access, deny it entirely. If it needs one endpoint, allow only that endpoint.
  2. Restrict executable binaries. Use seccomp to deny execution of general-purpose network tools (curl, wget, python3, nc) inside the sandbox. Only allow the specific tool binaries the agent requires.
  3. Monitor tool invocation patterns. Set up alerting for unusual /tools/invoke calls — file reads of paths not typically accessed, network requests to allowed endpoints with unusually large payloads, or tool invocations at unusual times.
  4. Run NemoClaw behind a reverse proxy with request logging. Log all outbound requests from the NemoClaw host to allowed endpoints. Review for data exfiltration patterns: large POST bodies, base64-encoded content, or requests that do not match the expected API call format.
  5. Accept the alpha risk. NemoClaw is in alpha. NVIDIA explicitly states to “expect rough edges.” These findings are consistent with alpha-quality software. If your risk tolerance requires production-grade sandbox isolation, NemoClaw is not there yet. Layer it with Docker containers, network segmentation, and external monitoring to compensate.
Section 5 • Community

Community Reports: r/LocalLLaMA and RTX 5090 Issues

The r/LocalLLaMA subreddit has been a primary forum for NemoClaw early adopters. Several community members reported that sandbox isolation was bypassed on RTX 5090 systems running NemoClaw with local vLLM inference. The specific issues include sandbox processes accessing host GPU memory mappings that should be isolated, and network namespace leaks where the sandboxed agent could observe host network interfaces.

Separately, multiple users reported HTTP CONNECT proxy 403 errors when the sandboxed agent attempted to establish connections through the privacy router’s proxy mechanism. These 403 errors indicate that the proxy is rejecting requests, but the error handling exposes information about the proxy’s configuration (endpoint whitelist entries, proxy port) that an attacker could use to craft more targeted bypass attempts.

“Sandbox isolation was bypassed on my RTX 5090 setup. The agent process could see host network interfaces and GPU memory mappings that should have been isolated by the namespace. Running NemoClaw alpha on real hardware is not the same as running it in NVIDIA’s test environment.”

— r/LocalLLaMA user, NemoClaw RTX 5090 deployment thread, March 2026

These community reports are harder to verify than the Snyk Labs findings because they do not include reproducible proof-of-concept code. However, the pattern is consistent: NemoClaw’s sandbox isolation is implemented through kernel features (Landlock, seccomp, namespaces) that behave differently depending on kernel version, GPU driver version, and hardware configuration. A sandbox that works correctly on one system may have gaps on another. This is the cost of alpha software — the edge cases have not been fully mapped.

Broader Ecosystem Concerns: Malicious Skills and UX Gaps

The sandbox escape findings exist within a broader context of ecosystem-level security concerns. Particula.tech reported that after OpenClaw hit 250K GitHub stars, approximately 20% of its community-contributed skills were found to contain malicious code — backdoors, data exfiltration routines, or privilege escalation payloads. This is why NemoClaw’s sandbox matters even with known bypasses: the threat surface is not just theoretical prompt injection but actively malicious code in the skill supply chain.

TechPlanet covered this gap directly in “NemoClaw: Securing OpenClaw Agents with Sandboxed Inference” — the argument being that NemoClaw’s sandbox, even in alpha, provides the containment layer that bare OpenClaw completely lacks against malicious skills.

UX Issue: GitHub Issue #296 — Sandbox Setup Can Be Skipped

GitHub issue #296 documents a UX problem in NemoClaw’s onboarding flow: users can skip the sandbox name configuration step and receive an “installation complete” message without the sandbox actually being configured. This means a user may believe they have a working NemoClaw sandbox when the security layer was never initialized. Always verify sandbox status with nemoclaw status after installation and confirm the output shows Sandbox: ACTIVE.

Section 6 • Assessment

Enterprise Impact Assessment: Should You Still Deploy NemoClaw?

Yes, with qualifications. NemoClaw with these known vulnerabilities is still materially more secure than bare OpenClaw with no sandbox at all. The question is not “Is NemoClaw perfectly secure?” (it is not) but “Is NemoClaw better than the alternative?” (it is). The 42,665 exposed OpenClaw instances with no authentication, no sandbox, and no policy engine represent a far worse security posture than NemoClaw with known, mitigatable bypass paths.

The practical guidance for enterprise teams is layered defense. Do not treat NemoClaw as a complete security solution. Treat it as one layer in a defense-in-depth stack that includes host hardening, network segmentation, output monitoring, and incident response procedures. NemoClaw raises the bar from “trivially exploitable” to “requires meaningful effort and specific attack chains.” That is valuable, even if it is not sufficient alone.

Finding Severity Mitigation Available NVIDIA Fix Timeline
/tools/invoke exfiltration High Yes — tool deny list + restricted host user Tracked, no ETA published
TOCTOU race condition Medium Yes — nosymfollow mount option Tracked, no ETA published
Policy preset gap (#272) Medium Partial — seccomp binary restrictions Open GitHub issue
Prompt injection via allowed endpoints High Partial — minimize permissions + monitoring Fundamental limitation
Reference • FAQ

Frequently Asked Questions

Has NVIDIA acknowledged these security findings?

NVIDIA has acknowledged NemoClaw’s alpha status and the expectation of “rough edges.” GitHub issue #272 (policy preset gap) is publicly tracked in the NemoClaw repository. The Snyk Labs findings were published in a responsible disclosure timeline. NVIDIA has not published specific patch timelines for the /tools/invoke bypass or the TOCTOU race condition. Enterprise teams should track the NemoClaw GitHub repository’s security advisories and subscribe to NVIDIA’s security notification list.

Should we wait for these issues to be fixed before deploying NemoClaw?

That depends on your risk tolerance and alternatives. If your current setup is bare OpenClaw with no sandbox, deploying NemoClaw today — even with these known issues — is a security improvement. If your current setup already has Docker container isolation, network segmentation, and monitoring, NemoClaw adds incremental value but the known bypasses mean you should not remove your existing security layers. Deploy NemoClaw as an additional layer, not a replacement for defense-in-depth. See our NemoClaw limitations analysis for the full gap assessment.

Do these findings affect NemoClaw’s local inference privacy guarantees?

The privacy router’s local-only mode (blocking all external network traffic) is separate from the sandbox bypass findings. The /tools/invoke bypass allows file reading; it does not bypass the privacy router’s network controls. If your NemoClaw deployment uses local vLLM inference with the privacy router in local-only mode and the network namespace configured to block all external traffic, the inference data does not leave the machine even if the sandbox filesystem controls are bypassed. The privacy guarantee and the sandbox guarantee are independent security layers.

How can we detect if these bypasses are being exploited in our deployment?

Monitor NemoClaw’s audit logs for: (1) /tools/invoke calls to filesystem-related tools when workspaceAccess is “none” (indicates Finding 1 exploitation), (2) rapid repeated file access attempts to the same path (indicates TOCTOU race attempts), (3) outbound HTTP requests with unusually large POST bodies to allowed endpoints (indicates data exfiltration through Finding 3/4). Set up alerting on these patterns. ManageMyClaw’s Enterprise Managed Care includes automated monitoring for all four bypass patterns with SOC-compatible alert formatting.

Need a NemoClaw Security Assessment? Our $2,500 Enterprise Assessment tests all four documented bypass paths against your specific NemoClaw configuration, validates mitigations, and delivers a written remediation plan with priority ordering. View Security Assessment