China’s government agencies and state-owned enterprises, including the country’s largest banks, have received notices warning employees against installing OpenClaw on office devices, according to reports published on March 12, 2026.
Who Is Affected
The restrictions target a broad range of institutions: state-run enterprises, government agencies, major state-owned banks, and even military personnel and their families. Some notices call for outright bans on installation, while others require prior approval before use.
Certain employees at banks and government agencies have been explicitly prohibited from installing OpenClaw on work computers or personal phones connected to company networks.
Why the Crackdown
Security experts have identified what one researcher described as a “lethal trifecta” of risks:
- Broad data access — OpenClaw requires unusually wide access to private data on the host system
- External communication — The agent can reach outside systems, creating potential vulnerability pathways
- Untrusted content exposure — Combined with the above, this creates opportunities for data exfiltration
The ban follows documented incidents of malfunctioning agents, including one user who reported their OpenClaw agent “went rogue” and sent hundreds of messages after accessing iMessage.
Context
This crackdown stands in contrast to local government support for OpenClaw — just days earlier, Shenzhen’s Longgang District launched the world’s first government policy to encourage OpenClaw adoption. The dual approach reflects China’s broader AI strategy: encourage innovation at the local level while maintaining strict security controls at sensitive institutions.
For users who want the benefits of an OpenClaw agent without the security headaches of self-hosting, OpenClaw Launch provides managed instances with built-in isolation and security defaults.