Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation

Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation

Posted on March 25, 2026 By CWS

A critical security vulnerability has been identified in ClawHub, the skill registry platform for the OpenClaw agentic ecosystem. This flaw has been exploited by attackers to artificially enhance the download counts of harmful skills, thus bypassing security measures and altering search rankings.

Manipulation of Skill Rankings

The vulnerability allowed threat actors to elevate compromised skills to the top of the rankings, enabling widespread supply-chain attacks targeting both human users and autonomous AI agents. ClawHub, akin to npm for OpenClaw agents, is used by developers to publish integrations for various tasks, including calendar management and web searches.

Users and AI models often rely on download statistics as a trust metric. Consequently, inflated download numbers can easily deceive targets into installing malicious code posing as popular skills.

Technical Details of the Exploit

The vulnerability originated from ClawHub’s backend implementation using the convex framework, which employs a typed Remote Procedure Call (RPC) model. In this system, backend functions are defined as either public or internal.

Silverfort researchers discovered that the downloads: increment function was incorrectly exposed as a public mutation, rather than an internal function. This misconfiguration allowed attackers to send unauthenticated requests to the exposed URL with any skill identifier. Without authentication, rate limiting, or deduplication, the endpoint could be triggered repeatedly, artificially inflating download metrics.

Impact and Response

To demonstrate the risk, Silverfort executed a proof-of-concept supply chain attack, publishing a legitimate-looking skill with a hidden data-exfiltration payload. By exploiting the RPC endpoint, they increased the skill’s download count, falsely elevating its ranking in ClawHub search results.

Within days, the skill achieved nearly 4,000 executions across multiple locations, infiltrating various corporations. The attack highlighted how easily threat actors could gather sensitive data, such as usernames and domain names, from the execution context of an agent.

Silverfort disclosed the flaw to OpenClaw’s team on March 16, 2026. Lead developer Peter Steinberger and the security team quickly addressed the issue, implementing a fix within 24 hours. This incident underscores the hidden security challenges in fast-paced development environments and the risks of AI agents choosing installations based solely on social proof.

To prevent future vulnerabilities, Silverfort has introduced ClawNet, a new open-source security plugin for OpenClaw. ClawNet operates during runtime to intercept installation attempts, scanning skills for malicious patterns before execution is allowed.

Cyber Security News Tags:AI agents, ClawHub, Cybersecurity, malicious code, OpenClaw, Security, skill ranking, supply chain attack, tech news, Vulnerability

Post navigation

Previous Post: Russian Hacker Sentenced for Role in US Ransomware Attacks
Next Post: Google Passkey System Reveals New Security Concerns

Related Posts

SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Cyber Security News
Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Cyber Security News
Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more Cyber Security News
Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams Cyber Security News
Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Updates iOS, macOS with Critical Security Fixes
  • Russian Hacker Jailed for Botnet Ransomware Crimes
  • Critical NGINX Vulnerability: Code Execution Risk via MP4
  • FCC Prohibits Import of Foreign-Made Routers for Security
  • AI Agents Pose New Threat to Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Updates iOS, macOS with Critical Security Fixes
  • Russian Hacker Jailed for Botnet Ransomware Crimes
  • Critical NGINX Vulnerability: Code Execution Risk via MP4
  • FCC Prohibits Import of Foreign-Made Routers for Security
  • AI Agents Pose New Threat to Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark