I've had this feeling for a while too; partially due to the screeching of "putting your ssh server on a random port isn't security!" over the years.
But I've had one on a random port running fail2ban and a variety of other defenses, and the # of _ATTEMPTS_ I've had on it in 15 years I can't even count on one hand, because that number is 0. (Granted the arguability of that's 1-hand countable or not.)
So yes this is a different thing, but there is always a difference between possible and probable, and sometimes that difference is large.
There is a single attack vector, with a single target, with a prompt particularly engineered to defend this particular scenario.
This doesn't at all generalize to the infinity of scenarios that can be encountered in the wild with a ClawBot instance.
wont catch the myriad of possible obfuscation, but its simple
The observatory is at: https://wire.botsters.dev/observatory
(But nothing there yet.)
I just had my agent, FootGun, build a Hacker News invite system. Let me know if you want a login.
Phew! Atleast you told it not to!