Containers Solve One Layer. Here's the Other One.
Tank OS puts OpenClaw agents in rootless containers. That's useful infrastructure, and a different layer of the problem than what produces the failures making news.

What Tank OS Actually Does
Sally O'Malley, a Red Hat principal engineer and OpenClaw maintainer, shipped Tank OS this week, an open-source tool that loads OpenClaw into a rootless Podman container, bakes it into a bootable Fedora image, and gives IT teams a way to manage fleets of agents the same way they already manage container workloads. Each instance gets its own credential store. No instance can reach anything running outside its container. Updates flow through standard container tooling.
The rootless part matters. Podman's rootless containers don't inherit host privileges, which closes the class of failures where a compromised agent escapes its box and touches the underlying machine. For IT teams managing hundreds of corporate machines, the operational story is also genuinely better: consistent images, no credential sharing between instances, familiar update paths.
This is a useful piece of the picture. It addresses a real layer.
What the Container Layer Doesn't Reach
The TechCrunch piece mentions two incidents in passing: a Meta security researcher whose OpenClaw agent started deleting her work email, and an agent that dumped a user's WhatsApp DMs in plain text. Both of those happened with agents that had access. Both happened because the agent did exactly what it was configured to do — applied literally, in a context where literal application was the wrong move.
Neither of those failures is a container problem. A rootless Podman container wouldn't have changed either outcome. The email deletion agent had permission to delete email. The WhatsApp exfiltration agent had permission to read messages. The container boundary is between the agent and the host OS. The damage happened inside the boundary, in the authorized action space the agent was given.
This is the modal enterprise failure mode right now: not escape, not privilege escalation, not malware. An agent acting confidently on instructions that, applied to real data in a real environment, produce results nobody wanted.
Two Layers, Both Real
O'Malley is quoted saying OpenClaw can be "dangerous" if not configured properly, and that it's not for people without technical experience. That framing is right. But the configuration risk she's pointing at and the isolation risk Tank OS addresses are distinct.
Isolation problems: agent reaches host filesystem, agent A reads agent B's credentials, malware targeting the agent runtime gets host-level access. Tank OS addresses these directly.
Action-layer problems: agent deletes the wrong email, agent sends a message to the wrong recipient, agent calls a destructive API endpoint that was technically in scope. These require a different answer — one that lives at the moment between "the agent decided what to do" and "the thing got done." Who reviews actions above a certain consequence threshold? Which operations are reversible, and which aren't? What does the audit trail say about why the agent acted?
O'Malley says her real interest is in what OpenClaw looks like "scaled out when there are millions of these autonomous agents talking to one another." At that scale, the isolation layer Tank OS provides is necessary infrastructure. The action governance layer is what determines whether those millions of agents produce the outcomes their operators intended.
Why This Distinction Is Harder to Ship
Container tooling is the easier product to build and the easier story to tell. The security claim is concrete: the agent can't reach the host. You can test it. You can demonstrate it. The tooling maps onto existing IT workflows that enterprise buyers already understand.
Action governance is harder. The controls are fuzzier and "consequential action" isn't a binary, reversibility exists on a spectrum, and the right approval threshold varies by organization, by workflow, and by the specific action being taken. The tooling doesn't map onto anything IT teams already run. And the failure mode it prevents is less visible: the thing that didn't go wrong because someone reviewed it is invisible, whereas the compromised container that touched the host filesystem leaves evidence.
The interesting question for anyone building enterprise agent infrastructure right now: how do you make the action governance layer as operationally lightweight as the container layer? If it requires meaningful human attention for every operation, it won't survive the first month. If it's invisible until something goes wrong, it's not actually there.