A security researcher at OX Security recently issued a chilling warning: Common uninstallation methods leave behind credentials and configuration files . Even if you think you've cleaned everything up, your API keys, OAuth tokens, chat logs, and even linked Google account permissions—are all still there. What's more terrifying is that because you've already deleted the
openclaw
command-line tool, you can't even run the official cleanup command.
This article is here to help you uninstall OpenClaw completely and thoroughly , while ensuring the entire process is safe, orderly, and reversible . Whether you are using macOS, Linux, or Windows, and whether you installed via npm, deployed with Docker, or compiled from source, you'll find the answers you need here.
First things first: What exactly does OpenClaw leave on your computer?
Before we start uninstalling, we need to know where the "enemy" is hiding. OpenClaw is not a simple command-line tool—it is a complete AI Agent Operating System , with its own gateway service, memory system, configuration database, and skill plugin ecosystem.
Based on official documentation and community tutorials, OpenClaw leaves the following "footprints" on your system:
1. Core Configuration Directories
Path Content ~/.openclaw/ Main configuration directory, containing openclaw.json, API keys, workspace, and memory files ~/.openclaw/workspace/ AI workspace, storing files it has operated on ~/.openclaw/memory/ Memory system data (SQLite + Markdown) ~/.openclaw/logs/ Gateway log files
2. Historical Residual Directories
This is a massive pitfall that many people overlook. OpenClaw went through two name changes in late January 2026: Clawdbot → Moltbot → OpenClaw. If you installed it at different stages, your system might simultaneously have three sets of configuration directories :
~/.clawdbot/~/.moltbot/~/.molthub/(Skill cache directory)~/.openclaw/
3. System Services
OpenClaw installs a background daemon called Gateway , which listens on port
127.0.0.1:18789
and runs 24/7:
- macOS : LaunchAgent (
~/Library/LaunchAgents/ai.openclaw.gateway.plist) - Linux : systemd user service (
~/.config/systemd/user/openclaw-gateway.service) - Windows : Scheduled Task (
OpenClaw Gateway)
4. npm Global Packages
Global CLI tools installed via npm/pnpm/bun.
5. Docker Containers and Images
If you deployed using Docker, there are also containers, images, and data volumes that need to be cleaned up.
6. macOS App (If applicable)
/Applications/OpenClaw.app
and the
/tmp/openclaw/
temporary directory.
In short: OpenClaw's "roots" run much deeper than you think. Just deleting an npm package is like plucking the leaves off a weed while the roots continue to grow wildly in the soil.
Step 1: Backup — The prerequisite for elegance is "reversibility"
Before officially making your move, always back up first . This is not a superfluous step, but the core of being "elegant."
Plan A: Manual Backup
# Backup the entire configuration directory
cp -r ~/.openclaw ~/openclaw-backup-$(date +%Y%m%d)
# If you need to keep workspace files
cp -r ~/.openclaw/workspace ~/openclaw-workspace-backup
Plan B: Use the community's "Uninstall Shrimp" tool
There is a third-party tool on GitHub called openclaw-uninstaller (MIT licensed, supports Python 3.7+), which offers a very thoughtful feature — archive first, then say goodbye :
pip install openclaw-uninstaller
openclaw-uninstall # Or shorthand ocu
It automatically creates a snapshot backup (supports tar.gz format) before uninstallation, allowing you to fully restore configurations and identities upon reinstallation. If you're unsure whether you'll return to it in the future, this is the safest choice.
Tip : The backup includes the~/.openclawmain configuration directory and the~/.config/openclawconfiguration cache, but it automatically excludes logs and cache files to save space.
Step 2: Stop Services — "Power off" before "dismantling"
This is the most crucial step; skipping it may cause subsequent operations to fail. If the Gateway is still running, files might be locked and undeletable, and ports won't be released.
macOS
# Stop and unload LaunchAgent
launchctl bootout gui/$UID/ai.openclaw.gateway 2>/dev/null
launchctl bootout gui/$UID/bot.molt.gateway 2>/dev/null
launchctl bootout gui/$UID/com.openclaw.gateway 2>/dev/null
# Kill residual processes
pkill -f openclaw || true
Linux
# Stop and disable systemd service
systemctl --user stop openclaw-gateway.service
systemctl --user disable openclaw-gateway.service
rm -f ~/.config/systemd/user/openclaw-gateway.service
systemctl --user daemon-reload
Windows (PowerShell, Admin Privileges)
# Delete scheduled task
schtasks /Delete /F /TN "OpenClaw Gateway"
# Terminate process
Get-Process -Name "openclaw*" | Stop-Process -Force
Verify Services Have Stopped
# Check if port 18789 is still occupied
lsof -i :18789 # macOS/Linux
netstat -ano | findstr :18789 # Windows
If there is still output, it means the service has not fully stopped. Do not proceed ; investigate the cause first.
Step 3: Execute Uninstallation — Use the official command if available
Best Plan: Official One-Click Uninstallation
If your
openclaw
command is still available, be sure to use the official command first :
openclaw uninstall --all --yes --non-interactive
This command will sequentially:
- Stop the Gateway service
- Delete the state directory (
~/.openclaw) - Uninstall the npm global package
Important Reminder : A mistake many people make is runningnpm uninstall -g openclawfirst , which causes theopenclawcommand to disappear, making it impossible to run the official uninstallation command afterward. The correct order is:openclaw uninstallfirst, then handle the npm package .
If the official command is unavailable
Already manually deleted the npm package? Don't panic, it can still be remedied:
# Call temporarily using npx
npx -y openclaw uninstall --all --yes --non-interactive
If even npx doesn't work, then honestly follow the manual route (see next section).
Step 4: Manual Cleanup — Eradicate completely
Even if the official command executes successfully, the following manual checks are still necessary because the official uninstallation will not clean up residual directories of historical names .
Delete All Configuration Directories
# Current version
rm -rf ~/.openclaw
# Historical version residuals (many people forget this step!)
rm -rf ~/.clawdbot
rm -rf ~/.moltbot
rm -rf ~/.molthub
# macOS specific
rm -rf /Applications/OpenClaw.app
rm -rf /tmp/openclaw/
rm -f ~/Library/LaunchAgents/ai.openclaw.gateway.plist
rm -f ~/Library/LaunchAgents/bot.molt.gateway.plist
rm -f ~/Library/LaunchAgents/com.openclaw.plist
Windows users, please execute in PowerShell:
Remove-Item -Recurse -Force "$env:USERPROFILE\.openclaw"
Remove-Item -Recurse -Force "$env:USERPROFILE\.clawdbot"
Remove-Item -Recurse -Force "$env:USERPROFILE\.moltbot"
Remove-Item -Recurse -Force "$env:APPDATA\OpenClaw"
Uninstall CLI Tools
# Installed via npm
npm uninstall -g openclaw
npm uninstall -g @qingchencloud/openclaw-zh # If the Chinese localized version was installed
# Installed via pnpm
pnpm remove -g openclaw
# Installed via bun
bun remove -g openclaw
Docker Cleanup
# Stop and remove container
docker stop openclaw && docker rm openclaw
# Remove data volume
docker volume rm openclaw-data
# Remove image
docker rmi openclaw/openclaw:latest
# If docker-compose was used
docker compose down --volumes
Clean Up Shell Configuration
Check your
.bashrc
,
.zshrc
, or
.bash_profile
, and delete all environment variables and PATH configurations related to OpenClaw.
Step 5: Revoke Authorizations — This is what it means to be truly "thorough"
This is the step that 90% of people overlook, and it is also what security experts worry about the most.
OpenClaw uses long-lived OAuth tokens to connect to your various accounts. These tokens are stored on the service providers' servers, not on your computer —so deleting local files won't affect them at all.
Security researchers at Kaspersky pointed out that OpenClaw's current security posture is "insecure at best, and utterly reckless at worst." Cisco's security team demonstrated how malicious Skills could steal API keys via prompt injection.
List of Authorizations That Must Be Revoked Manually
| Platform | Operation Path |
|---|---|
| http:// myaccount.google.com/pe rmissions → Find OpenClaw related apps → Remove access | |
| Slack | http:// slack.com/apps/manage → Find and remove |
| Discord | Settings → Authorized Apps → Deauthorize |
| GitHub | Settings → Applications → Authorized OAuth Apps → Revoke |
| Telegram | Check Bot settings, delete related Bot |
| Microsoft | http:// account.live.com/consen t/Manage |
| Notion | Settings → Connections → Remove OpenClaw |
Rotate API Keys
All API keys ever configured in OpenClaw should be revoked and regenerated :
- API Keys for AI models like OpenAI / Claude / DeepSeek
- Access Keys for cloud services (AWS, Alibaba Cloud, Tencent Cloud)
- API tokens for any third-party services
Security Advice : If you are unsure which services OpenClaw has connected to, you can check the configuration information in the~/.openclaw/openclaw.jsonand~/.openclaw/agents/*/agent/auth-profiles.jsonfiles before deleting~/.openclaw.
Step 6: Verification — Trust, but verify
After uninstallation is complete, perform the following checks to ensure everything is clean:
# 1. Check if command is removed
which openclaw
# Expected output: openclaw not found
# 2. Check if configuration directories are deleted
ls ~/.openclaw ~/.clawdbot ~/.moltbot ~/.molthub 2>&1
# Expected output: No such file or directory
# 3. Check if background services are stopped (macOS)
launchctl list | grep -i openclaw
launchctl list | grep -i molt
launchctl list | grep -i clawd
# Expected output: None
# 4. Check if background services are stopped (Linux)
systemctl --user list-units | grep -i openclaw
# Expected output: None
# 5. Check if ports are released
lsof -i :18789
# Expected output: None
# 6. Check if processes are terminated
ps aux | grep -i openclaw
# Expected output: Only grep itself
If all six checks above pass, congratulations, your system has completely bid farewell to OpenClaw .
Why the need for such caution? — Starting from the ClawHavoc Incident
You might think: Is it really necessary? Making an uninstallation so complicated?
But if you understand the security storm OpenClaw went through in early 2026, you'll realize this caution is not superfluous.
ClawHavoc: Supply Chain Attack in the AI Era
Between January 27 and February 1, 2026, attackers uploaded 1,184 malicious Skills to OpenClaw's official skill market, ClawHub. These plugins masqueraded as cryptocurrency trading bots, productivity tools, and social media tools, but were actually:
- Stealing browser credentials, SSH keys, and crypto wallets (via Atomic macOS Stealer)
- Establishing backdoors to achieve persistent remote access
- Stealing API keys and environment variables via prompt injection
Just one account,
hightower6eu
, uploaded 677 malicious packages . Security audits revealed that 36.8% of Skills on ClawHub contained security vulnerabilities , and 135,000 OpenClaw instances across 82 countries were exposed on the public internet.
CVE-2026-25253: Critical Remote Code Execution Vulnerability
In addition to the supply chain attack, a critical vulnerability with a CVSS score of 8.8 was discovered in OpenClaw itself — it could not distinguish between connections from the developer's own trusted applications and connections from malicious websites in the browser.
Evaluations from Security Organizations
- Microsoft : Pointed out that OpenClaw has a "dual supply chain risk," where skills and external commands converge in the same runtime.
- Cisco : Demonstrated how malicious Skills could steal data via silent curl commands.
- Kaspersky : Security audits discovered 512 vulnerabilities, 8 of which were critical .
- Bitsight : Tracked over 30,000 publicly exposed OpenClaw instances .
This is why uninstalling OpenClaw cannot be taken lightly — you not only need to delete the software itself, but also clear out all the security hazards it might have left behind.
After Uninstallation: Where to go from here?
If you chose to uninstall due to security concerns but are still interested in AI Agents, here are a few directions for your reference:
Safer Alternatives
- NanoClaw : Container-isolated architecture, only about 3,900 lines of code, extremely small attack surface.
- Claude Code : Anthropic's official professional coding Agent, enterprise-grade security guarantees.
- QClaw : Tencent's productized wrapper based on OpenClaw, one-click deployment + WeChat/QQ direct connection, more suitable for domestic users.
- Dify : Enterprise-grade AI application platform with 129K+ GitHub Stars.
If you plan to return
Using the snapshot feature of the openclaw-uninstaller tool mentioned earlier, you can restore all configurations with one click when reinstalling in the future, saving the trouble of reconfiguring models, channels, and skills.
Summary: A Checklist to Ensure Nothing Goes Wrong
| Step | Operation | Status |
|---|---|---|
| 1 | Backup configuration (Optional but recommended) | [ ] |
| 2 | Stop Gateway service | [ ] |
| 3 | Run openclaw uninstall --all | [ ] |
| 4 | Delete all residual directories (including historical names) | [ ] |
| 5 | Uninstall npm/pnpm/bun global packages | [ ] |
| 6 | Clean up Docker containers/images/volumes | [ ] |
| 7 | Delete related entries in Shell configuration | [ ] |
| 8 | Revoke all OAuth authorizations | [ ] |
| 9 | Rotate all API keys | [ ] |
| 10 | Execute verification checks | [ ] |
Uninstalling software isn't hard; what's hard is uninstalling it cleanly, thoroughly, and elegantly. As the fastest-growing open-source project in GitHub's history (250,000 Stars in 60 days), OpenClaw's architectural complexity far exceeds that of ordinary tools. But as long as you follow this guide step-by-step, you can ensure your system returns to its clean pre-installation state, leaving no security hazards behind.
Snappixify