Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
    Cybersecurity

    Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

    adminBy adminFebruary 2, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks.

    ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills. It’s an extension to the OpenClaw project, a self-hosted artificial intelligence (AI) assistant formerly known as both Clawdbot and Moltbot.

    The analysis, which Koi conducted with the help of an OpenClaw bot named Alex, found that 335 skills use fake pre-requisites to install an Apple macOS stealer named Atomic Stealer (AMOS). This set has been codenamed ClawHavoc.

    “You install what looks like a legitimate skill – maybe solana-wallet-tracker or youtube-summarize-pro,” Koi researcher Oren Yomtov said. “The skill’s documentation looks professional. But there’s a ‘Prerequisites’ section that says you need to install something first.”

    This step involves instructions for both Windows and macOS systems: On Windows, users are asked to download a file called “openclaw-agent.zip” from a GitHub repository. On macOS, the documentation tells them to copy an installation script hosted at glot[.]io and paste it into the Terminal app. The targeting of macOS is no coincidence, as reports have emerged of people buying Mac Minis to run the AI assistant 24×7.

    Present within the password-protected archive is a trojan with keylogging functionality to capture API keys, credentials, and other sensitive data on the machine, including those that the bot already has access to. On the other hand, the glot[.]io script contains obfuscated shell commands to fetch next-stage payloads from an attacker-controlled infrastructure.

    This, in turn, entails reaching out to another IP address (“91.92.242[.]30”) to retrieve another shell script, which is configured to contact the same server to obtain a universal Mach-O binary that exhibits traits consistent with Atomic Stealer, a commodity stealer available for $500-1000/month that can harvest data from macOS hosts.

    Cybersecurity

    According to Koi, the malicious skills masquerade as

    • ClawHub typosquats (e.g., clawhub, clawhub1, clawhubb, clawhubcli, clawwhub, cllawhub)
    • Cryptocurrency tools like Solana wallets and wallet trackers
    • Polymarket bots (e.g., polymarket-trader, polymarket-pro, polytrading)
    • YouTube utilities (e.g., youtube-summarize, youtube-thumbnail-grabber, youtube-video-downloader)
    • Auto-updaters (e.g., auto-updater-agent, update, updater)
    • Finance and social media tools (e.g., yahoo-finance-pro, x-trends-tracker)
    • Google Workspace tools claiming integrations with Gmail, Calendar, Sheets, and Drive
    • Ethereum gas trackers
    • Lost Bitcoin finders

    In addition, the cybersecurity company said it identified skills that hide reverse shell backdoors inside functional code (e.g., better-polymarket and polymarket-all-in-one), or exfiltrate bot credentials present in “~/.clawdbot/.env” to a webhook[.]site (e.g., rankaj).

    The development coincides with a report from OpenSourceMalware, which also flagged the same ClawHavoc campaign targeting OpenClaw users.

    “The skills masquerade as cryptocurrency trading automation tools and deliver information-stealing malware to macOS and Windows systems,” a security researcher who goes by the online alias 6mile said.

    “All these skills share the same command-and-control infrastructure (91.92.242[.]30) and use sophisticated social engineering to convince users to execute malicious commands, which then steal crypto assets like exchange API keys, wallet private keys, SSH credentials, and browser passwords.”

    OpenClaw Adds a Reporting Option

    The problem stems from the fact that ClawHub is open by default and allows anyone to upload skills. The only restriction at this stage is that a publisher must have a GitHub account that’s at least one week old.

    The issue with malicious skills hasn’t gone unnoticed by OpenClaw’s creator Peter Steinberger, who has since rolled out a reporting feature that allows signed-in users to flag a skill. “Each user can have up to 20 active reports at a time,” the documentation states. “Skills with more than 3 unique reports are auto-hidden by default.”

    Cybersecurity

    The findings underscore how open-source ecosystems continue to be abused by threat actors, who are now piggybacking on OpenClaw’s sudden popularity to orchestrate malicious campaigns and distribute malware at scale.

    In a report last week, Palo Alto Networks warned that OpenClaw represents what British programmer Simon Willison, who coined the term prompt injection, describes as a “lethal trifecta” that renders AI agents vulnerable by design due to their access to private data, exposure to untrusted content, and the ability to communicate externally.

    The intersection of these three capabilities, combined with OpenClaw’s persistent memory, “acts as an accelerant” and amplifies the risks, the cybersecurity company added.

    “With persistent memory, attacks are no longer just point-in-time exploits. They become stateful, delayed-execution attacks,” researchers Sailesh Mishra and Sean P. Morgan said. “Malicious payloads no longer need to trigger immediate execution on delivery. Instead, they can be fragmented, untrusted inputs that appear benign in isolation, are written into long-term agent memory, and later assembled into an executable set of instructions.”

    “This enables time-shifted prompt injection, memory poisoning, and logic bomb–style activation, where the exploit is created at ingestion but detonates only when the agent’s internal state, goals, or tool availability align.”

    ClawHub data Find Malicious OpenClaw researchers skills stealing Users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat Is Schema Markup? & How to Add It to Your Site
    Next Article This affordable pickup doesn’t feel cheap at all
    admin
    • Website

    Related Posts

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google removes accessibility section from JavaScript SEO section

    March 5, 2026

    Home Assistant 2026.3 has arrived: Here’s what’s new

    March 5, 2026

    Digital sovereignty options for on-prem deployments

    March 5, 2026

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (612)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (387)
    • Tech Tools & Mobile / Apps (750)
    • WiFi / Internet & Networking (109)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google removes accessibility section from JavaScript SEO section

    March 5, 2026

    Home Assistant 2026.3 has arrived: Here’s what’s new

    March 5, 2026

    Digital sovereignty options for on-prem deployments

    March 5, 2026
    Most Popular
    • Google removes accessibility section from JavaScript SEO section
    • Home Assistant 2026.3 has arrived: Here’s what’s new
    • Digital sovereignty options for on-prem deployments
    • Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
    • These are the 7 best phones I found at MWC 2026
    • Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
    • Why Most Enterprise SEO Operating Models Are Structurally Broken
    • Zank Remote – Android, Fire TV 20.3.0 APK Download by zank
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.