Recently, there has been quite concerning news about the ClawHub plugin marketplace from OpenClaw. Security researchers have identified over 1,184 malicious skills circulating there—quite a large number for a marketplace.



What’s most worrying is the scale of the attacks. A single attacker managed to upload 677 malicious packages, meaning nearly 57% of all malicious skills come from one source. They target SSH keys, crypto wallets, browser passwords, and can even open reverse shells. So basically, if you have skills from this platform, sensitive data could be directly exposed.

Data shows that 36.8% of all skills on ClawHub have at least one vulnerability. Even crazier, there are over 135,000 OpenClaw instances open in 82 countries. That means a lot of people are potentially exposed.

The most downloaded skill is 'What Would Elon Do'—the most dangerous with 9 vulnerabilities, 2 of which are critical level. This skill has generated 4,000 fake downloads, ranking first. They mainly target users and AI agents using ClickFix social engineering techniques and prompt injection attacks.

Fortunately, OpenClaw has partnered with VirusTotal to scan all skills and clean up malicious listings. But if you’ve ever used ClawHub, don’t relax—change all credentials, revoke API keys, and check security settings. This really needs attention, especially for crypto wallet security.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin