Clawctl
Security
8 min

OpenClaw Data Privacy: Where Your Data Lives and Who Can Access It

Complete guide to OpenClaw data privacy. Learn what data is processed, where it's stored, GDPR considerations, and how Clawctl protects your information.

Clawctl Team

Product & Engineering

OpenClaw Data Privacy: Where Your Data Lives and Who Can Access It

Your AI agent processes sensitive information: conversations, files, emails, credentials. Where does that data go? Who can access it? How long is it retained?

This guide answers the privacy questions that matter for OpenClaw deployments.

What Data Does OpenClaw Process?

AI agents touch more data than you might realize.

Conversation Data

Data TypeExamples
User prompts"Send an email to...", "Summarize this document..."
Agent responsesGenerated text, summaries, analysis
ContextPrevious messages in conversation
MetadataTimestamps, session IDs, channel info

Connected Account Data

SourceData Accessed
EmailMessages, attachments, contacts
CalendarEvents, attendees, descriptions
Slack/DiscordMessages, channels, user info
File systemsDocuments, code, configurations

System Data

Data TypeExamples
CredentialsAPI keys, OAuth tokens, passwords
ConfigurationAgent settings, policies, preferences
LogsAction history, errors, debugging info
MetricsUsage stats, performance data

Data Flow: Where Does It Go?

Self-Hosted Data Flow

                    ┌─────────────────────────────────────┐
                    │         Your Server                 │
                    │  ┌─────────────────────────────┐   │
User Input ────────►│  │      OpenClaw Agent         │   │
                    │  │                             │   │
                    │  │  Conversations: Local disk  │   │
                    │  │  Credentials: ~/.openclaw/  │   │
                    │  │  Files: Workspace folder    │   │
                    │  └──────────┬──────────────────┘   │
                    │             │                       │
                    └─────────────┼───────────────────────┘
                                  │
                                  ▼
                         LLM Provider (Anthropic/OpenAI)
                         - Prompts sent for processing
                         - Responses returned

Data locations:

  • Conversations: Stored on your server (often plaintext)
  • Credentials: ~/.openclaw/openclaw.json (plaintext by default)
  • Files: Your workspace directory
  • Logs: Server filesystem (if configured)

Who can access:

  • Anyone with server access
  • Anyone who finds exposed dashboard
  • LLM provider (sees prompts)

Clawctl Data Flow

                    ┌─────────────────────────────────────┐
                    │         Clawctl Cloud               │
                    │  ┌─────────────────────────────┐   │
User Input ────────►│  │    Your Isolated Tenant     │   │
       │            │  │                             │   │
       │            │  │  Conversations: Encrypted   │   │
       │            │  │  Credentials: Secure vault  │   │
       │            │  │  Logs: Encrypted storage    │   │
       │            │  └──────────┬──────────────────┘   │
       │            │             │                       │
       │            └─────────────┼───────────────────────┘
       │                          │
       │                          ▼
       │                 LLM Provider (Anthropic/OpenAI)
       │                 - Prompts sent for processing
       │                 - Responses returned
       │
       └──► Gateway Auth required for all access

Data locations:

  • Conversations: Encrypted in Clawctl storage
  • Credentials: Encrypted vault, injected at runtime
  • Logs: Encrypted audit storage
  • Tenant isolation: Infrastructure-level separation

Who can access:

  • You (after gateway authentication)
  • Your team (with appropriate permissions)
  • LLM provider (sees prompts—same as self-hosted)
  • Clawctl: Cannot access encrypted customer data

Third-Party Data Sharing

LLM Providers

Both self-hosted and managed OpenClaw send prompts to LLM providers:

ProviderData SentRetentionTraining Use
AnthropicPrompts, contextTemporaryNot used for training
OpenAIPrompts, context30 days (API)Not used for training (API)

Important: Review each provider's data usage policies. API access typically has different (better) privacy terms than consumer products.

What's Sent to LLM Providers

  • Your prompts (what you ask the agent)
  • Context (conversation history)
  • Tool call descriptions
  • Response requests

What's NOT Sent

  • Your credentials (API keys for Slack, etc.)
  • Files (unless you ask the agent to summarize them)
  • System configuration

Data Storage Comparison

Self-Hosted Storage

DataStorageEncryptionAccess Control
ConversationsLocal diskNone (default)File permissions
CredentialsJSON fileNoneFile permissions
LogsLocal diskNoneFile permissions
FilesWorkspaceNoneFile permissions

Risks:

  • Single point of failure
  • No encryption by default
  • Easy to accidentally expose
  • Backups may leak data

Clawctl Storage

DataStorageEncryptionAccess Control
ConversationsClawctl DBAES-256-GCMTenant isolation
CredentialsSecure vaultAES-256-GCMRuntime injection only
LogsAudit storageAES-256-GCMRole-based access
FilesTenant storageAES-256-GCMTenant isolation

Protections:

  • Encryption at rest
  • Encryption in transit (TLS 1.3)
  • Tenant isolation
  • Access logging

GDPR Considerations

If you process EU personal data, GDPR applies to your OpenClaw deployment.

Key GDPR Requirements

RequirementSelf-HostedClawctl
Lawful basisYour responsibilityYour responsibility
Data minimizationYour configurationYour configuration
Storage limitationYour implementationConfigurable retention
Right to accessBuild export capabilityExport via dashboard/API
Right to erasureBuild deletion capabilityDelete via dashboard/API
Data securityYour implementationBuilt-in encryption
Breach notificationYour processIncident response included

GDPR Best Practices

  1. Document your lawful basis for processing personal data with AI agents
  2. Minimize data retention — Don't keep data longer than needed
  3. Implement deletion — Be able to delete user data on request
  4. Audit access — Know who accessed what data
  5. Assess LLM providers — Review their GDPR compliance

Data Processing Agreement

For managed hosting, ensure you have a DPA in place. Clawctl provides standard DPA for Business customers.

Data Retention

Retention Recommendations

Data TypeRecommended Retention
Active conversationsDuration of use
Audit logs30-90 days (compliance-dependent)
CredentialsUntil rotated/revoked
Archived dataAs required by policy

Clawctl Retention by Plan

PlanAudit Log Retention
Starter7 days
Team30 days
Business90 days (customizable)

Implementing Retention (Self-Hosted)

# Example: Delete logs older than 30 days
find /var/log/openclaw -mtime +30 -delete

# Automate with cron
0 0 * * * find /var/log/openclaw -mtime +30 -delete

Data Deletion

Right to Erasure

Users may request deletion of their data. Be prepared to:

  1. Identify all data related to the user
  2. Delete from all storage locations
  3. Verify deletion is complete
  4. Document the deletion for compliance

Deletion in Clawctl

# Delete specific conversation
clawctl data delete --conversation conv_123

# Delete all data for a user
clawctl data delete --user user@example.com

# Export before deletion (for records)
clawctl data export --user user@example.com --output backup.json

Deletion Challenges

  • Backups: Data may exist in backups
  • Logs: Personal data may appear in logs
  • Third parties: Data sent to LLM providers
  • Derived data: Summaries, analysis based on original data

Document your deletion process and its limitations.

Privacy Checklist

Self-Hosted

  • Encrypt credentials at rest
  • Implement access controls on config files
  • Configure log retention/deletion
  • Document data flows for compliance
  • Review LLM provider privacy policies
  • Implement data export capability
  • Implement data deletion capability
  • Regular security audits

Managed (Clawctl)

  • Encryption at rest (handled)
  • Tenant isolation (handled)
  • Access logging (handled)
  • Review Clawctl privacy policy
  • Review LLM provider privacy policies
  • Configure appropriate retention
  • Document your data processing basis
  • Establish deletion procedures

Frequently Asked Questions

Where does OpenClaw store my data?

Self-hosted: On your server, typically in ~/.openclaw/ and your workspace directory. Managed (Clawctl): In your isolated tenant with encryption at rest.

Can Clawctl see my conversations?

No. Your data is encrypted with keys Clawctl cannot access. We can see metadata (usage stats, timestamps) but not content.

Is OpenClaw GDPR compliant?

OpenClaw is a tool—compliance depends on how you deploy and configure it. Self-hosted requires you to implement GDPR controls. Clawctl provides the technical controls; you're responsible for lawful basis and processes.

What data is sent to Anthropic/OpenAI?

Your prompts and conversation context. Not your credentials, configuration, or files (unless you explicitly include them in prompts).

How long is my data retained?

Self-hosted: Until you delete it. Clawctl: Based on your plan (7-90 days for audit logs). Credentials persist until you rotate them.

Can I delete all my data?

Self-hosted: Delete your workspace and config directories. Clawctl: Use the dashboard or CLI to delete your data. Account deletion removes all tenant data.

Summary

AspectSelf-HostedClawctl
Data locationYour serverClawctl cloud (isolated tenant)
EncryptionYou implementBuilt-in (AES-256-GCM)
Access controlFile permissionsGateway auth + RBAC
Audit trailYou implementAutomatic
GDPR readinessYou buildTools provided
Data deletionYou implementDashboard/CLI

Deploy with data protection → | Enterprise compliance → | Privacy policy →

Ready to deploy your OpenClaw securely?

Get your OpenClaw running in production with Clawctl's enterprise-grade security.