Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Found in Top OpenClaw Skill Exposes Major Security Flaws

Malware Found in Top OpenClaw Skill Exposes Major Security Flaws

Posted on February 19, 2026 By CWS

The discovery of malware embedded in the most downloaded skill on OpenClaw’s ClawHub marketplace has unveiled significant security vulnerabilities. This malicious software, disguised as a legitimate AI tool, highlights the risks associated with open-source platforms.

Exposing the Threat

OpenClaw, known for its open-source AI agent platform, operates ClawHub, a marketplace where developers publish skills to enhance agent capabilities. Security researcher @chiefofautism recently uncovered 1,184 malicious skills, with one actor responsible for uploading 677 of these packages. This indicates a severe supply chain vulnerability within the AI agent ecosystem.

Alarmingly, ClawHub’s verification process required only a one-week-old GitHub account, enabling attackers to upload numerous malicious skills under the guise of legitimate applications such as crypto trading tools and YouTube summarizers. These skills, complete with professional documentation, concealed harmful code that misled users.

Mechanisms of the Malware

Once activated, the malware instructed AI agents to execute commands through hidden AI prompts. On macOS, it deployed Atomic Stealer (AMOS), which extracted sensitive information like browser passwords, SSH keys, and crypto wallet credentials. On other systems, it opened a reverse shell, granting attackers remote access to compromised machines.

Cisco’s AI Defense team uncovered nine vulnerabilities in a top-ranked ClawHub skill, “What Would Elon Do?” These included critical exploits that exfiltrated user data to an attacker’s server using undetectable methods. The skill was downloaded thousands of times, exacerbating the problem.

Addressing the Security Breach

The vulnerability issue was not new; Koi Security had previously identified 341 malicious entries in ClawHub, linked to a campaign called ClawHavoc. Similarly, Snyk’s audit revealed 341 threats, with the publisher “hightower6eu” responsible for over 314 hazardous packages. These findings pointed to a common command-and-control server.

In response, OpenClaw partnered with Google’s VirusTotal to scan all uploaded skills, categorizing them as benign, suspicious, or malicious. Daily re-scans aim to detect mutations in these skills post-approval.

This incident mirrors npm supply chain attacks but with a unique twist: the malware functions within an AI agent, capable of executing commands with broad system permissions. Traditional security tools struggle to detect these natural language-encoded threats, posing a significant challenge.

Organizations using OpenClaw face heightened risks from “Shadow AI” activities, where agent actions bypass conventional monitoring and leave limited audit trails. Continuous vigilance and advanced security measures are crucial to mitigate these threats.

Cyber Security News Tags:AI agent, AI security, ClawHub, Cybersecurity, Malware, OpenClaw, reverse shell, security vulnerability, SSH keys, supply chain attack

Post navigation

Previous Post: China’s Vulnerability Databases Impact Global Security
Next Post: Link11 Unveils AI Management Dashboard for Enhanced Traffic Control

Related Posts

Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Cyber Security News
Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season Cyber Security News
ChatGPT Health – A Dedicated Space for Health Queries With Strong Privacy and Security ChatGPT Health – A Dedicated Space for Health Queries With Strong Privacy and Security Cyber Security News
Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework Cyber Security News
SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Addresses High-Severity Windows Admin Center Flaw
  • Phishing Campaign Targets Job Seekers with Fake Google Forms
  • INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa
  • Android AI Malware Uses Google’s Gemini for New Threats
  • New Android Malware Uses AI for Persistent Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Addresses High-Severity Windows Admin Center Flaw
  • Phishing Campaign Targets Job Seekers with Fake Google Forms
  • INTERPOL’s Cybercrime Crackdown Nets 651 Arrests in Africa
  • Android AI Malware Uses Google’s Gemini for New Threats
  • New Android Malware Uses AI for Persistent Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News