On March 6, 2026, Tencent Cloud announced the free deployment of the open-source AI tool, OpenClaw (commonly referred to as 'Longxia' or 'Lobster'). Developed by programmer Peter Steinberg, this tool is distinguished by its 'lobster'-themed icon and the slogan, 'The AI That Gets Things Done.' Unlike traditional conversational AI models, OpenClaw can be deployed on personal computers or in the cloud, directly executing tasks such as file management, email handling, and code writing through natural language commands. This bridges the gap from mere 'suggestions' to actual 'execution.' On the launch day, nearly a thousand developers and AI enthusiasts queued up at Tencent’s headquarters in Shenzhen to get OpenClaw installed. Tencent Cloud engineers offered comprehensive one-stop services, including installation, model configuration, and skill activation, with cloud deployment achievable in just five minutes. Tencent Cloud’s Lighthouse lightweight application server provided robust technical support for the event, with the number of developers and the utilization of server cores reaching unprecedented levels.
Following the surge in OpenClaw’s popularity, domestic cloud service providers such as Alibaba Cloud, JD Cloud, Volcano Engine, and Baidu Intelligent Cloud quickly followed suit, introducing simplified cloud deployment services that enabled users to install the tool with a single click. Tencent’s founder, Pony Ma, shared news of this event on his social media, stating, 'Its popularity has truly surprised us.' Additionally, the market witnessed the emergence of professional installation services, with prices ranging from 300 to 500 yuan. Some even offered outrageous perks, such as 'free cleaning services.' However, OpenClaw’s high-privilege requirements have sparked security concerns. The Cybersecurity Threat and Vulnerability Information Sharing Platform under the Ministry of Industry and Information Technology issued a warning, highlighting that certain OpenClaw instances pose significant risks under default or improper configurations, making them susceptible to cyberattacks and information leaks. Users are urged to implement stringent security measures during deployment.
