Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation

Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation

Posted on March 25, 2026 By CWS

A critical security vulnerability has been identified in ClawHub, the skill registry platform for the OpenClaw agentic ecosystem. This flaw has been exploited by attackers to artificially enhance the download counts of harmful skills, thus bypassing security measures and altering search rankings.

Manipulation of Skill Rankings

The vulnerability allowed threat actors to elevate compromised skills to the top of the rankings, enabling widespread supply-chain attacks targeting both human users and autonomous AI agents. ClawHub, akin to npm for OpenClaw agents, is used by developers to publish integrations for various tasks, including calendar management and web searches.

Users and AI models often rely on download statistics as a trust metric. Consequently, inflated download numbers can easily deceive targets into installing malicious code posing as popular skills.

Technical Details of the Exploit

The vulnerability originated from ClawHub’s backend implementation using the convex framework, which employs a typed Remote Procedure Call (RPC) model. In this system, backend functions are defined as either public or internal.

Silverfort researchers discovered that the downloads: increment function was incorrectly exposed as a public mutation, rather than an internal function. This misconfiguration allowed attackers to send unauthenticated requests to the exposed URL with any skill identifier. Without authentication, rate limiting, or deduplication, the endpoint could be triggered repeatedly, artificially inflating download metrics.

Impact and Response

To demonstrate the risk, Silverfort executed a proof-of-concept supply chain attack, publishing a legitimate-looking skill with a hidden data-exfiltration payload. By exploiting the RPC endpoint, they increased the skill’s download count, falsely elevating its ranking in ClawHub search results.

Within days, the skill achieved nearly 4,000 executions across multiple locations, infiltrating various corporations. The attack highlighted how easily threat actors could gather sensitive data, such as usernames and domain names, from the execution context of an agent.

Silverfort disclosed the flaw to OpenClaw’s team on March 16, 2026. Lead developer Peter Steinberger and the security team quickly addressed the issue, implementing a fix within 24 hours. This incident underscores the hidden security challenges in fast-paced development environments and the risks of AI agents choosing installations based solely on social proof.

To prevent future vulnerabilities, Silverfort has introduced ClawNet, a new open-source security plugin for OpenClaw. ClawNet operates during runtime to intercept installation attempts, scanning skills for malicious patterns before execution is allowed.

Cyber Security News Tags:AI agents, ClawHub, Cybersecurity, malicious code, OpenClaw, Security, skill ranking, supply chain attack, tech news, Vulnerability

Post navigation

Previous Post: Russian Hacker Sentenced for Role in US Ransomware Attacks
Next Post: Google Passkey System Reveals New Security Concerns

Related Posts

Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Cyber Security News
Hackers Abusing GitHub Notifications to Deliver Phishing Emails Hackers Abusing GitHub Notifications to Deliver Phishing Emails Cyber Security News
Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
Evilmouse: A  Device Breaches System Security Evilmouse: A $44 Device Breaches System Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark