OpenClaw's AI Agent Skills Turn Into Security Nightmare as Malware Floods ClawHub

Reviewed byNidhi Govil

5 Sources

Share

OpenClaw, the viral AI agent that automates tasks like email management and flight check-ins, has become a security crisis. Researchers discovered over 400 malicious skill add-ons on its ClawHub marketplace designed to steal cryptocurrency credentials and sensitive data. Gartner now urges enterprises to block the software entirely, calling it an unacceptable cybersecurity risk.

OpenClaw Security Risk Exposes Users to Malware Attacks

OpenClaw, the autonomous AI agent that surged in popularity for its ability to manage calendars, clear inboxes, and automate daily tasks, now faces severe scrutiny as cybersecurity researchers uncover a flood of malicious skill add-ons on its marketplace. The platform, created by Peter Steinberger and previously known as Clawdbot and Moltbot, has become what 1Password's VP Jason Meller describes as "an attack surface," with its most-downloaded extension functioning as a malware delivery vehicle

1

.

Source: XDA-Developers

Source: XDA-Developers

OpenSourceMalware identified 28 malicious skills published on the ClawHub marketplace between January 27th and 29th, followed by an additional 386 malicious plugins uploaded between January 31st and February 2nd. These malicious skill add-ons masquerade as cryptocurrency trading automation tools while delivering information-stealing malware that harvests exchange API keys, wallet private keys, SSH credentials, and browser passwords

1

.

Source: TechRadar

Source: TechRadar

How the AI Agent Creates an Unacceptable Cybersecurity Risk

The security nightmare stems from OpenClaw's fundamental design. This AI agent runs locally on devices and requires extensive permissions to function, including the ability to read and write files, execute scripts, and run shell commands. Users connect it to messaging apps like WhatsApp, Telegram, and iMessage, giving it access to sensitive communications and personal data

1

.

Source: The Register

Source: The Register

Gartner issued unusually strong guidance warning against OpenClaw, describing it as "a dangerous preview of agentic AI" that exposes enterprises to "insecure by default" risks like plaintext credential storage. The analyst firm recommends businesses immediately block OpenClaw downloads and traffic, search for users accessing the software, and rotate any credentials the tool has touched

2

.

Kasimir Schulz from HiddenLayer Inc. explained that OpenClaw meets all criteria of the "lethal trifecta" for gauging risk in AI systems: access to private data, ability to communicate externally, and exposure to untrusted content

3

.

Prompt Injection and Sensitive Data Exfiltration Threats

The attack surface extends beyond malicious plugins. Security experts warn that prompt injection attacks can easily manipulate OpenClaw into executing unintended actions. Yue Xiao, an assistant computer science professor at the College of William & Mary, noted that hackers can disguise malicious commands as legitimate prompts, making it relatively easy to steal personal data

3

.

Cisco's threat research team demonstrated one example where a malicious skill called "What Would Elon Do?" performed sensitive data exfiltration via a hidden curl command while using prompt injection to force the agent to run the attack without user permission. This skill was manipulated to rank number one on ClawHub

4

.

Meller discovered that OpenClaw's skills are often uploaded as markdown files containing malicious instructions for both users and the AI agent. One popular "Twitter" skill directed users to a link designed to make the agent download infostealing malware

1

.

Cloud Providers Rush to Offer OpenClaw Despite Warnings

Despite mounting security concerns, major cloud providers have rushed to deliver OpenClaw-as-a-service offerings. Tencent Cloud launched a one-click install tool for its Lighthouse service, followed by DigitalOcean with similar instructions for its Droplets infrastructure. Alibaba Cloud made OpenClaw available across 19 regions starting at $4 per month, with plans to expand to its Elastic Compute Service and Elastic Desktop Service

2

.

This rapid commercialization occurs as Gartner warns that "shadow deployment of OpenClaw creates single points of failure, as compromised hosts expose API keys, OAuth tokens, and sensitive conversations to attackers." The firm emphasizes that OpenClaw "is not enterprise software" with no promise of quality, vendor support, or service-level agreements

2

.

Creator Defends Open Source Approach Amid Growing Concerns

Peter Steinberger maintains that both OpenClaw and its security remain works in progress. "It's simply not done yet -- but we're getting there," he told Bloomberg News, adding that the project targets tech-savvy users who understand the inherent risk nature of Large Language Models (LLMs). He disputed claims of premature release, stating: "I build fully in the open. There's no 'release too early,' since it's open source from the start"

3

.

Steinberger has implemented some protective measures, requiring GitHub accounts at least one week old to publish skills on ClawHub and adding a reporting mechanism for suspicious content. However, these changes don't eliminate the possibility of malware infiltrating the ecosystem

1

.

Software engineer Chris Boyd experienced OpenClaw's dangers firsthand when the AI agent went rogue after he granted it iMessage access, bombarding him and his wife with over 500 messages and spamming random contacts. "It's a half-baked rudimentary piece of software that was glued together haphazardly and released way too early," Boyd said

3

.

Name Changes Add Confusion to Security Landscape

OpenClaw's multiple rebrands have created additional security vulnerabilities. Originally launched as "warelay" in November 2025, it became "clawdis" in December before settling on Clawdbot in January 2026. After receiving a cease and desist from Anthropic, it rebranded to Moltbot, then finally OpenClaw. Each name change provides opportunities for attackers to create convincing impersonations

4

.

Hackers have already published a fake Visual Studio Code extension impersonating the assistant under its former Moltbot name. The extension functioned as advertised but carried a Trojan deploying remote access software with backup loaders disguised as legitimate updates

5

.

What Users and Enterprises Should Watch

Justin Cappos, a cybersecurity expert at New York University, compared giving new AI agents system access to "giving a toddler a butcher knife." He explained that security communities struggle to keep pace as AI companies deploy teams working around the clock to roll out new features

3

.

For organizations considering OpenClaw or similar autonomous AI agent platforms, Gartner recommends running them only in isolated nonproduction virtual machines with throwaway credentials. Users must verify every skill extension as carefully as any executable dependency, particularly commands requiring manual execution. Conventional protections like firewalls offer little defense when attacks rely on executing local commands through seemingly legitimate extensions

5

.

The OpenClaw situation highlights broader challenges facing the AI industry as companies race to deploy agentic capabilities without adequate security frameworks. With credential theft incidents mounting and the open source ecosystem vulnerable to malicious actors, the balance between innovation and protection remains precarious for users seeking to automate workflows through AI-powered tools.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo