A very concerning security discovery just happened – the ClawHub plugins marketplace is under a massive supply chain attack. Researchers found over 1,184 malicious skills planted there, each capable of stealing highly sensitive data – SSH keys, crypto wallets, browser passwords, and worse, they can activate reverse shell connections.



The numbers are truly frightening. Just one attacker uploaded 677 malicious packages, meaning more than 57% of the attacks (57%) came from a single individual. And looking at the stats, you'll find that about 37% of all skills on the platform contain at least one security vulnerability.

The most dangerous part? There are over 135,000 exposed copies of OpenClaw spread across 82 countries worldwide. The most harmful skill is called "What Would Elon Do" – it contains 9 separate vulnerabilities, two of which are extremely critical, and the skill received 4,000 fake downloads to appear legitimate.

Attackers are using very clever techniques – combining ClickFix social engineering and hint injection attacks to target users and AI agents simultaneously.

OpenClaw moved quickly and collaborated with VirusTotal for a comprehensive scan of the skills and removal of malicious listings. But if you've used any skills from ClawHub in the past, you need to change all your credentials immediately – change passwords, revoke API keys, and carefully review security settings. Running a scan via VirusTotal or specialized security tools can help verify any suspicious files.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin