High SeverityOperational

No Kill Switch

When you can't stop your AI agent

Without an instant shutdown capability, a compromised or malfunctioning AI agent can continue causing damage while you scramble to regain control.

What is No Kill Switch?

A kill switch is the ability to immediately and completely stop an AI agent's operation. Without one, you have no way to quickly halt an agent that has been compromised, is malfunctioning, or is simply behaving unexpectedly.

The need for a kill switch becomes apparent in scenarios like: - Your agent is compromised and actively exfiltrating data - A runaway process is deleting files or making unwanted changes - The agent is sending spam or making unauthorized API calls - You notice suspicious behavior but aren't sure what's happening - An urgent situation requires immediate shutdown

In self-hosted deployments, stopping an agent often means SSH-ing into servers, finding processes, and manually killing them—a process that can take precious minutes while damage continues.

How No Kill Switch Works

No Shutdown Mechanism

The deployment has no designed way to quickly stop the agent.

Distributed Execution

The agent runs across multiple processes or containers with no central control.

Restart Policies

Containerization or systemd automatically restarts killed processes.

Background Jobs

Queued or scheduled tasks continue executing even after main process stops.

External Triggers

Webhooks or integrations continue invoking the agent from outside.

Real-World Example

During a security incident, a team discovered their AI agent was compromised at 2 AM:

1. The on-call engineer noticed unusual outbound traffic 2. They couldn't SSH in because the attacker had changed credentials 3. They tried to stop the cloud instance but the agent was in a serverless function 4. The function kept being invoked by a webhook they couldn't quickly disable 5. It took 45 minutes to fully stop the agent 6. By then, significant data had been exfiltrated

A one-click kill switch would have stopped the breach in seconds instead of minutes.

Potential Impact

Extended breach duration and data loss
Continued resource consumption during incidents
Ongoing spam or malicious activity
Escalating damage from runaway processes
Stress and mistakes during manual shutdown
Inability to quickly contain blast radius

Self-Hosted Vulnerabilities

When you self-host your OpenClaw, you're responsible for addressing these risks:

No dedicated shutdown mechanism
Multiple places to stop (process, container, scheduler)
May require server access you don't have readily
Auto-restart policies work against you
Queued work continues after main process stops
External triggers keep invoking the agent

How Clawctl Protects You

Clawctl includes built-in protection against no kill switch:

One-Click Kill Switch

Instantly terminate any agent with a single click from the dashboard. No SSH, no hunting for processes.

Comprehensive Shutdown

Kill switch stops all agent processes, cancels queued work, and pauses external triggers.

Mobile Access

Trigger kill switch from your phone. Respond to incidents from anywhere.

Automatic Triggers

Configure automatic shutdown based on anomaly detection or resource thresholds.

Post-Mortem Support

Shutdown preserves state for investigation. Understand what happened before resuming.

General Prevention Tips

Whether you use Clawctl or not, follow these best practices:

Design shutdown mechanisms before you deploy
Test that you can actually stop your agent quickly
Have runbooks for emergency shutdown procedures
Ensure multiple team members can trigger shutdown
Consider automatic shutdown triggers for anomalies
Don't let restart policies defeat your kill switch

Don't risk no kill switch

Clawctl includes enterprise-grade protection against this threat and many others. Deploy your OpenClaw securely in 60 seconds.