I just learned about a quite serious security situation on ClawHub. Researchers have discovered a large-scale supply chain attack – over 1,184 malicious skills specifically designed to steal SSH keys, crypto wallets, and browser passwords.



This is truly impressive. One attacker is responsible for 677 packages – accounting for 57% of all malicious entries. It was found on the platform that 36.8% of skills have at least one vulnerability. And the most "popular" malicious skill called "What Would Elon Do" received 4,000 fake downloads and contains 9 vulnerabilities, two of which are critical.

Interestingly, these skills attack both users and AI agents simultaneously, using social engineering and prompt injection. The scale of the problem involves over 135,000 active instances of OpenClaw in 82 countries worldwide.

On the positive side, OpenClaw is already working with VirusTotal to scan all skills on the platform and remove malicious entries. VirusTotal helps detect and block such threats in real-time. But if you have used skills from ClawHub, it’s better not to wait – change all your credentials, revoke API keys, and review your security settings. Better to be safe than sorry.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin