Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace
Summary
Hide ▲
Show ▼
A malicious GitHub campaign, tracked as **"TroyDen's Lure Factory"**, is distributing over **300 Trojanized packages**, including a fake **OpenClaw Docker deployer**, to deliver a LuaJIT-based data-stealing Trojan. The campaign targets developers, gamers, and the general public with lures ranging from AI tools to game cheats, exploiting automated analysis gaps by splitting the payload into two components—a renamed Lua runtime and an encrypted script—that evade detection when analyzed separately. Once executed, the Trojan captures screenshots, performs geolocation, and exfiltrates credentials to a Frankfurt-based C2 server, with a **29,000-year sleep delay** to defeat sandboxes. GitHub was notified on **March 20, 2026**, but at least two lure repositories remain active. This follows a pattern of **supply-chain and social engineering attacks** leveraging OpenClaw’s popularity, including prior incidents like the **Cline npm compromise** (February 2026), **malicious ClawHub skills** pushing info-stealers, and **exposed OpenClaw instances** (40,000+ vulnerable deployments globally). Chinese authorities have restricted OpenClaw usage in state-run enterprises due to its **privileged system access and prompt injection risks**, while threat actors continue to distribute **fake installers** (e.g., Atomic Stealer, Vidar, GhostSocks proxy malware). Users are urged to **verify repository authenticity, isolate AI tools, and audit environments** for unexpected OpenClaw installations.
Timeline
-
14.03.2026 18:17 1 articles · 10d ago
Chinese authorities restrict OpenClaw usage due to security risks
Chinese authorities have moved to restrict state-run enterprises and government agencies from running OpenClaw AI apps on office computers in a bid to contain security risks. The ban is also said to extend to the families of military personnel. Threat actors have distributed malicious GitHub repositories posing as OpenClaw installers to deploy information stealers like Atomic and Vidar Stealer, and a Golang-based proxy malware known as GhostSocks.
Show sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
20.02.2026 00:33 3 articles · 1mo ago
Cline npm package supply chain attack installs OpenClaw
The supply chain attack affected all users who installed the Cline CLI package version 2.3.0 during an eight-hour window on February 17, 2026. The attack did not impact Cline's Visual Studio Code (VS Code) extension and JetBrains plugin. Cline maintainers released version 2.4.0 to mitigate the unauthorized publication and revoked the compromised token. Microsoft Threat Intelligence observed a small but noticeable uptick in OpenClaw installations on February 17, 2026, due to the supply chain compromise. Users are advised to update to the latest version, check their environment for any unexpected installation of OpenClaw, and remove it if not required. The compromised Cline package was downloaded approximately 4,000 times during the eight-hour stretch.
Show sources
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
03.02.2026 12:00 2 articles · 1mo ago
Moltbook database misconfiguration exposes user data
A self-styled social networking platform built for AI agents, Moltbook, contained a misconfigured database that allowed full read and write access to all data. The exposure was due to a Supabase API key exposed in client-side JavaScript, granting unauthenticated access to the entire production database. Researchers accessed 1.5 million API authentication tokens, 30,000 email addresses, and thousands of private messages between agents. The API key exposure allowed attackers to impersonate any agent on the platform, post content, send messages, and interact as that agent. Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and deface the site. The platform had 17,000 human 'owners' registered, and humans could post content disguised as 'AI agents' via a basic POST request. The platform had no mechanism to verify whether an 'agent' was actually AI or just a human with a script.
Show sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
02.02.2026 21:11 2 articles · 1mo ago
Malicious OpenClaw skills push password-stealing malware
More than 230 malicious packages for OpenClaw (formerly Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. These malicious skills impersonate legitimate utilities and inject information-stealing malware payloads onto users' systems, targeting sensitive data like API keys, wallet private keys, SSH credentials, and browser passwords. The malware dropped on macOS systems is identified as a variant of NovaStealer that can bypass Gatekeeper and target various sensitive data. Koi Security found 341 malicious skills on ClawHub, attributing them to a single campaign, and also identified 29 typosquats for the ClawHub name. The creator of OpenClaw, Peter Steinberger, admitted the inability to review the massive number of skill submissions, advising users to double-check the safety of skills before deployment. Users are recommended to isolate the AI assistant in a virtual machine, give it restricted permissions, and secure remote access to it. Threat actors can upload malicious skills to repositories like ClawHub that, when installed, run arbitrary commands or deploy malware.
Show sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
28.01.2026 22:26 4 articles · 1mo ago
Supply-chain attack via Moltbot Skill demonstrated
A supply-chain attack against Moltbot users was demonstrated via a Skill that contained a minimal 'ping' payload. The developer published the skill on the official MoltHub (ClawdHub) registry and inflated its download count, making it the most popular asset. In less than eight hours, 16 developers in seven countries downloaded the artificially promoted skill. Additionally, a supply chain attack via the Cline npm package version 2.3.0 installed OpenClaw on users' systems, exploiting a prompt injection vulnerability in Cline's Claude Issue Triage workflow. The compromised package was downloaded approximately 4,000 times before being deprecated. Researchers at PromptArmor found that the link preview feature in messaging apps like Telegram or Discord can be turned into a data exfiltration pathway when communicating with OpenClaw by means of an indirect prompt injection.
Show sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
28.01.2026 19:46 5 articles · 1mo ago
Malicious Moltbot AI Coding Assistant Extension Discovered and Removed
SecurityScorecard found 40,214 exposed OpenClaw instances associated with 28,663 unique IP addresses. 63% of observed deployments are vulnerable, with 12,812 instances exploitable via remote code execution (RCE) attacks. SecurityScorecard correlated 549 instances with prior breach activity and 1493 with known vulnerabilities. Three high-severity CVEs in OpenClaw have been discovered, with public exploit code available. OpenClaw instances are at risk of indirect prompt injection and API key leaks, primarily located in China, the US, and Singapore. China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security risks stemming from the use of OpenClaw, an open-source and self-hosted autonomous AI agent. OpenClaw's inherently weak default security configurations and privileged access to the system could be exploited by bad actors to seize control of the endpoint. Prompt injections in OpenClaw can cause the agent to leak sensitive information if tricked into accessing and consuming malicious content. Indirect prompt injection (IDPI) or cross-domain prompt injection (XPIA) attacks can manipulate benign AI features like web page summarization or content analysis to run manipulated instructions.
Show sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
Information Snippets
-
The malicious extension "ClawdBot Agent - AI Coding Assistant" was published by a user named "clawdbot" on January 27, 2026.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The extension was taken down by Microsoft after being reported by cybersecurity researchers.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The extension executed a binary named "Code.exe" that deployed a legitimate remote desktop program, granting attackers persistent remote access.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The extension incorporated multiple fallback mechanisms, including retrieving a DLL from Dropbox and using hard-coded URLs to obtain the payloads.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Security researchers found hundreds of unauthenticated Moltbot instances online, exposing sensitive data and credentials.
First reported: 28.01.2026 19:463 sources, 4 articlesShow sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Users are advised to audit their configurations, revoke connected service integrations, and implement network controls to mitigate potential risks.
First reported: 28.01.2026 19:462 sources, 3 articlesShow sources
- Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware — thehackernews.com — 28.01.2026 19:46
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Moltbot is an open-source personal AI assistant with deep system integration that can be hosted locally on user devices.
First reported: 28.01.2026 22:262 sources, 3 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Moltbot can run 24/7 locally, maintaining a persistent memory, proactively reaching out to the user for alerts/reminders, and executing scheduled tasks.
First reported: 28.01.2026 22:262 sources, 2 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Exposed admin interfaces of Moltbot can lead to sensitive data leaks, corporate data exposure, credential theft, and command execution.
First reported: 28.01.2026 22:263 sources, 4 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Hundreds of Clawdbot Control admin interfaces are exposed online due to reverse proxy misconfiguration.
First reported: 28.01.2026 22:263 sources, 4 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Moltbot deployments behind reverse proxies often treat all internet traffic as trusted, allowing unauthenticated access, credential theft, access to conversation history, command execution, and root-level system access.
First reported: 28.01.2026 22:263 sources, 4 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
A supply-chain attack against Moltbot users was demonstrated via a Skill that contained a minimal 'ping' payload.
First reported: 28.01.2026 22:264 sources, 4 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
22% of Token Security's enterprise customers have employees actively using Moltbot, likely without IT approval.
First reported: 28.01.2026 22:262 sources, 2 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Moltbot poses risks such as exposed gateways, API/OAuth tokens, plaintext storage credentials, corporate data leakage, and an extended prompt-injection attack surface.
First reported: 28.01.2026 22:262 sources, 2 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
There is no sandboxing for the AI assistant by default, meaning the agent has the same complete access to data as the user.
First reported: 28.01.2026 22:264 sources, 5 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Info-stealing malware like RedLine, Lumma, and Vidar will soon adapt to target Moltbot’s local storage to steal sensitive data and account credentials.
First reported: 28.01.2026 22:263 sources, 4 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
A separate case of a malicious VSCode extension impersonating Clawdbot was caught by Aikido researchers, installing ScreenConnect RAT on developers' machines.
First reported: 28.01.2026 22:262 sources, 2 articlesShow sources
- Viral Moltbot AI assistant raises concerns over data security — www.bleepingcomputer.com — 28.01.2026 22:26
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
More than 230 malicious packages for OpenClaw (formerly Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub.
First reported: 02.02.2026 21:113 sources, 3 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
The malicious skills impersonate legitimate utilities such as cryptocurrency trading automation, financial utilities, and social media or content services.
First reported: 02.02.2026 21:112 sources, 2 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The skills inject information-stealing malware payloads onto users' systems, targeting sensitive data like API keys, wallet private keys, SSH credentials, and browser passwords.
First reported: 02.02.2026 21:112 sources, 2 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The malware dropped on macOS systems is identified as a variant of NovaStealer that can bypass Gatekeeper and target various sensitive data.
First reported: 02.02.2026 21:112 sources, 2 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Koi Security found 341 malicious skills on ClawHub, attributing them to a single campaign, and also identified 29 typosquats for the ClawHub name.
First reported: 02.02.2026 21:112 sources, 2 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The creator of OpenClaw, Peter Steinberger, admitted the inability to review the massive number of skill submissions, advising users to double-check the safety of skills before deployment.
First reported: 02.02.2026 21:112 sources, 2 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Users are recommended to isolate the AI assistant in a virtual machine, give it restricted permissions, and secure remote access to it.
First reported: 02.02.2026 21:113 sources, 3 articlesShow sources
- Malicious MoltBot skills used to push password-stealing malware — www.bleepingcomputer.com — 02.02.2026 21:11
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Moltbook, a social networking platform for AI agents, contained a misconfigured database that allowed full read and write access to all data.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The exposure was due to a Supabase API key exposed in client-side JavaScript, granting unauthenticated access to the entire production database.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Researchers accessed 1.5 million API authentication tokens, 30,000 email addresses, and thousands of private messages between agents.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The API key exposure allowed attackers to impersonate any agent on the platform, post content, send messages, and interact as that agent.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and deface the site.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The platform had 17,000 human 'owners' registered, and humans could post content disguised as 'AI agents' via a basic POST request.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The platform had no mechanism to verify whether an 'agent' was actually AI or just a human with a script.
First reported: 03.02.2026 12:002 sources, 2 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Vibe coding tools add speed but require careful human review before deployment to prevent security issues.
First reported: 03.02.2026 12:002 sources, 3 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Data leaks introduce 'deeper integrity risks' by enabling content manipulation including prompt injection.
First reported: 03.02.2026 12:002 sources, 3 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Security is an iterative process in AI product development, requiring multiple rounds of remediation.
First reported: 03.02.2026 12:002 sources, 3 articlesShow sources
- Vibe-Coded Moltbook Exposes User Data, API Keys and More — www.infosecurity-magazine.com — 03.02.2026 12:00
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
SecurityScorecard found 40,214 exposed OpenClaw instances associated with 28,663 unique IP addresses.
First reported: 09.02.2026 11:302 sources, 2 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
63% of observed OpenClaw deployments are vulnerable, with 12,812 exposed instances exploitable via remote code execution (RCE) attacks.
First reported: 09.02.2026 11:302 sources, 2 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
SecurityScorecard correlated 549 exposed instances with prior breach activity and 1493 with known vulnerabilities.
First reported: 09.02.2026 11:302 sources, 2 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Three high-severity CVEs in OpenClaw have been discovered, with public exploit code available for each.
First reported: 09.02.2026 11:302 sources, 2 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
OpenClaw instances are at risk of indirect prompt injection, allowing attackers to send malicious instructions via messages or hidden text.
First reported: 09.02.2026 11:302 sources, 2 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Some OpenClaw users have been leaking API keys linked to third-party services via their control panels.
First reported: 09.02.2026 11:303 sources, 3 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Most exposures are located in China, followed by the US and Singapore, with information services being the most impacted industry.
First reported: 09.02.2026 11:302 sources, 2 articlesShow sources
- Researchers Find 40,000+ Exposed OpenClaw Instances — www.infosecurity-magazine.com — 09.02.2026 11:30
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
A supply chain attack via the Cline npm package version 2.3.0 installed OpenClaw on users' systems.
First reported: 20.02.2026 00:332 sources, 3 articlesShow sources
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The attack exploited a prompt injection vulnerability in Cline's Claude Issue Triage workflow.
First reported: 20.02.2026 00:332 sources, 3 articlesShow sources
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The compromised Cline package was downloaded approximately 4,000 times over an eight-hour stretch.
First reported: 20.02.2026 00:332 sources, 3 articlesShow sources
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
OpenClaw has broad permissions and full disk access, making it a high-value implant for attackers.
First reported: 20.02.2026 00:332 sources, 3 articlesShow sources
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Cline released version 2.4.0 to address the issue and revoked the compromised token.
First reported: 20.02.2026 00:332 sources, 3 articlesShow sources
- Supply Chain Attack Secretly Installs OpenClaw for Cline Users — www.darkreading.com — 20.02.2026 00:33
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The supply chain attack affected all users who installed the Cline CLI package version 2.3.0 during an eight-hour window on February 17, 2026.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The attack did not impact Cline's Visual Studio Code (VS Code) extension and JetBrains plugin.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Cline maintainers released version 2.4.0 to mitigate the unauthorized publication and revoked the compromised token.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Microsoft Threat Intelligence observed a small but noticeable uptick in OpenClaw installations on February 17, 2026, due to the supply chain compromise.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The compromised Cline package was downloaded approximately 4,000 times during the eight-hour stretch.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Users are advised to update to the latest version, check their environment for any unexpected installation of OpenClaw, and remove it if not required.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The overall impact is considered low, despite high download counts, as OpenClaw itself is not malicious and the installation does not include the installation/start of the Gateway daemon.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The attack leveraged a misconfiguration in the workflow that gave Claude excessive permissions to achieve arbitrary code execution within the default branch.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The attack sequence employed GitHub Actions cache poisoning to pivot from the triage workflow to a highly privileged workflow and steal the nightly publication credentials.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
The unknown threat actor weaponized an active npm publish token to authenticate with the Node.js registry and publish Cline version 2.3.0.
First reported: 20.02.2026 16:201 source, 2 articlesShow sources
- Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems — thehackernews.com — 20.02.2026 16:20
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security risks stemming from the use of OpenClaw, an open-source and self-hosted autonomous AI agent.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
OpenClaw's inherently weak default security configurations and privileged access to the system could be exploited by bad actors to seize control of the endpoint.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Prompt injections in OpenClaw can cause the agent to leak sensitive information if tricked into accessing and consuming malicious content.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Indirect prompt injection (IDPI) or cross-domain prompt injection (XPIA) attacks can manipulate benign AI features like web page summarization or content analysis to run manipulated instructions.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Researchers at PromptArmor found that the link preview feature in messaging apps like Telegram or Discord can be turned into a data exfiltration pathway when communicating with OpenClaw.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
OpenClaw may inadvertently and irrevocably delete critical information due to its misinterpretation of user instructions.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Threat actors can upload malicious skills to repositories like ClawHub that, when installed, run arbitrary commands or deploy malware.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Attackers can exploit recently disclosed security vulnerabilities in OpenClaw to compromise the system and leak sensitive data.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Chinese authorities have moved to restrict state-run enterprises and government agencies from running OpenClaw AI apps on office computers.
First reported: 14.03.2026 18:171 source, 1 articleShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
-
Threat actors have distributed malicious GitHub repositories posing as OpenClaw installers to deploy information stealers like Atomic and Vidar Stealer, and a Golang-based proxy malware known as GhostSocks.
First reported: 14.03.2026 18:172 sources, 2 articlesShow sources
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration — thehackernews.com — 14.03.2026 18:17
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
A GitHub campaign tracked as "TroyDen's Lure Factory" is distributing over 300 Trojanized packages, including a fake Docker deployer for OpenClaw, targeting developers, gamers, and the general public.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
The malicious repository impersonates a legitimate OpenClaw Docker deployment tool, using a polished README, a github.io page, and listing multiple contributors (including a real developer with a 568-star repository) to appear authentic.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
The payload is a LuaJIT-based Trojan with a two-component design: a renamed Lua runtime and an encrypted script, which evades automated detection by passing sandbox analysis when either file is submitted alone.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
The Trojan performs anti-analysis checks, introduces a ~29,000-year sleep delay to defeat timed sandboxes, captures full-desktop screenshots immediately upon execution, and exfiltrates credentials to a C2 server in Frankfurt.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
Attackers used AI-generated lure names referencing obscure biological taxonomy, archaic Latin, and medical terminology, indicating operational AI was employed to scale and automate the campaign.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
GitHub was notified on March 20, 2026, but two of the lure repositories (‘Fishing Planet Cheat Menu’ and ‘phone-number-location-tracking-tool’) remain active as of March 24.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
-
The campaign exploits a ‘purpose-built gap in the automated analysis pipeline,’ requiring human analysts to detect the threat when both components execute together in context.
First reported: 24.03.2026 16:591 source, 1 articleShow sources
- GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead — www.darkreading.com — 24.03.2026 16:59
Similar Happenings
Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign
A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.
TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks
TeamPCP has expanded their multi-vector CanisterWorm campaign to target the LiteLLM PyPI package (versions 1.82.7 and 1.82.8), embedding credential-stealing malware with automatic execution mechanisms that harvested SSH keys, cloud provider credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, and TLS/SSL private keys before exfiltrating data to attacker-controlled infrastructure and establishing persistent backdoors. The compromised versions were removed from PyPI by March 25, 2026, but researchers warn of downstream breach disclosures and follow-on intrusions due to the volume of stolen credentials. The campaign began as a supply-chain attack involving 47 compromised npm packages and the @teale.io/eslint-config variant, leveraging ICP canisters for decentralized C2 and persistence via masqueraded systemd services. It escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and deployment of an infostealer, then pivoted to targeting CI/CD pipelines directly via GitHub Actions workflows (e.g., Checkmarx, Trivy) using stolen credentials. TeamPCP now compromises GitHub Actions workflows and Open VSX extensions to deploy the TeamPCP Cloud stealer, while refining destructive payloads targeting Iranian systems in Kubernetes environments with time-zone/locale-based wipers.
Malicious npm Package Targets macOS Users with RAT and Credential Theft
A malicious npm package named "@openclaw-ai/openclawai" masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from macOS systems. The package, uploaded on March 3, 2026, has been downloaded 178 times and remains available. It targets system credentials, browser data, crypto wallets, SSH keys, Apple Keychain databases, and iMessage history, while also installing a persistent RAT with remote access capabilities and a SOCKS5 proxy. The malware uses social engineering to harvest system passwords and employs sophisticated persistence and command-and-control (C2) infrastructure. The package triggers its malicious logic via a postinstall hook, re-installing itself globally and displaying a fake command-line interface to mimic an OpenClaw installation. It then retrieves an encrypted second-stage payload from a C2 server, which is decoded and executed to continue running in the background. The malware also prompts users to grant Full Disk Access (FDA) to Terminal to access protected data. The second-stage payload is a comprehensive information stealer and RAT framework capable of persistence, data collection, browser decryption, C2 communication, and live browser cloning. Collected data is exfiltrated through multiple channels, including the C2 server, Telegram Bot API, and GoFile.io. The malware also monitors clipboard content for specific patterns related to private keys and cryptocurrency addresses. The impact of this malware is significant, as it can compromise sensitive user data and provide attackers with persistent access to infected systems. The sophisticated nature of the malware, including its use of social engineering and encrypted payload delivery, makes it a serious threat to macOS users.
ClawJacked Flaw in OpenClaw Enables Local AI Agent Hijacking via WebSocket
A high-severity vulnerability in OpenClaw, codenamed ClawJacked, allows malicious websites to hijack locally running AI agents through WebSocket connections. The flaw exploits missing rate-limiting and auto-approval of trusted devices, enabling attackers to take control of the AI agent. OpenClaw has released a fix in version 2026.2.25, urging users to update immediately and enforce strict governance controls. The vulnerability is caused by the OpenClaw gateway service binding to localhost by default and exposing a WebSocket interface, allowing attackers to brute-force the management password and gain admin-level permissions. Once authenticated, attackers can interact directly with the AI platform, dumping credentials, listing connected nodes, stealing credentials, and reading application logs. The fix tightens WebSocket security checks and adds additional protections to prevent attackers from abusing localhost loopback connections.
PromptSpy Android Malware Uses Gemini AI for Persistence
PromptSpy, an advanced Android malware, uses Google's Gemini AI to maintain persistence by pinning itself in the recent apps list. The malware captures lockscreen data, blocks uninstallation, gathers device information, takes screenshots, and records screen activity. It communicates with a hard-coded C2 server and is distributed via a dedicated website targeting users in Argentina. PromptSpy is the first known Android malware to use generative AI in its execution flow, sending screen data to Gemini to receive instructions for maintaining persistence. The malware is an advanced version of VNCSpy and is likely financially motivated. Researchers have discovered that PromptSpy was first found in February 2026, with initial samples uploaded to VirusTotal from Hong Kong and Argentina. ESET has not observed the malware in its telemetry, suggesting it may be a proof-of-concept. ESET attributed PromptSpy to Chinese developers with medium confidence, but has not linked it to any known threat actor. PromptSpy deploys a VNC module on compromised systems, enabling operators to view the victim’s screen and take full control of the Android device. The malware saves both its previous prompts and Gemini’s responses, allowing Gemini to understand context and coordinate multistep interactions.