<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vessel Blog</title>
    <link>https://vesselofone.com/blog</link>
    <description>Writing on AI agents, OpenClaw security, and managed infrastructure.</description>
    <language>en-us</language>
    <atom:link href="https://vesselofone.com/rss.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title><![CDATA[What Self-Hosting OpenClaw Actually Costs (It's Not Just the VPS)]]></title>
      <link>https://vesselofone.com/blog/what-self-hosting-openclaw-actually-costs</link>
      <description><![CDATA[Every deployment guide says self-hosting OpenClaw costs $5-20/mo. I believed that too, until I started tracking where my time actually went. The VPS was the cheapest part.]]></description>
      <pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://vesselofone.com/blog/what-self-hosting-openclaw-actually-costs</guid>
      <author>Mehul Bhardwaj</author>
    </item>
    <item>
      <title><![CDATA[220,000 OpenClaw Instances Are Exposed on the Public Internet]]></title>
      <link>https://vesselofone.com/blog/220000-openclaw-instances-exposed</link>
      <description><![CDATA[A scan of the public internet found over 220,000 OpenClaw gateway ports reachable from anywhere. Here is what attackers can do with that access, and what you should do right now.]]></description>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://vesselofone.com/blog/220000-openclaw-instances-exposed</guid>
      <author>Mehul Bhardwaj</author>
    </item>
  </channel>
</rss>