Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cline CLI Supply Chain Breach Installs OpenClaw

Cline CLI Supply Chain Breach Installs OpenClaw

Posted on February 20, 2026 By CWS

On February 17, 2026, a significant supply chain attack occurred targeting the open-source Cline CLI, a coding assistant powered by artificial intelligence. The attack led to the unauthorized installation of OpenClaw, an autonomous AI agent, on developer systems. This incident has raised concerns about the security of software supply chains and AI-driven development tools.

Details of the Unauthorized Installation

According to the maintainers of Cline, the breach was executed using a compromised npm publish token. This token was exploited to release a malicious update on the NPM registry identified as [email protected]. The update included a modified package.json file with a script to automatically install OpenClaw. Although no malicious actions were linked to OpenClaw itself, its installation was neither approved nor planned by the Cline team.

The breach affected users who downloaded Cline CLI version 2.3.0 within an eight-hour window. The attack did not impact other Cline tools such as the Visual Studio Code extension or the JetBrains plugin. In response, Cline released version 2.4.0, deprecated the compromised version, and revoked the affected token. Additionally, they enhanced their npm publishing process to use OpenID Connect via GitHub Actions.

Community Response and Impact

The Microsoft Threat Intelligence team noted an increase in OpenClaw installations on the day of the breach, signaling the impact of the compromised package. StepSecurity reported approximately 4,000 downloads during the short window of vulnerability. Users have been advised to update to the latest version and inspect their systems for unauthorized installations of OpenClaw.

Despite the high number of downloads, experts like Endor Labs researcher Henrik Plate have classified the overall impact as low. OpenClaw is not inherently harmful, and its installation lacks the initiation of the Gateway daemon. However, this breach underscores the necessity for secure publishing practices and vigilant monitoring of package updates.

Exploiting Clinejection for Credential Theft

The breach has been linked to a vulnerability known as Clinejection, which involves exploiting the Cline repository’s issue triage workflow. Security researcher Adnan Khan highlighted how attackers could manipulate the GitHub issue title to execute arbitrary code. This misconfiguration allowed unauthorized access to repository tokens, posing a risk of further supply chain attacks.

The method utilized prompt injection to influence Claude, the AI agent involved in issue triage, granting it excessive permissions. By compromising cache entries, attackers could execute code in workflows and potentially steal publication secrets. This breach illustrates the need for robust governance of AI agents within development pipelines.

Chris Hughes, VP of Security Strategy at Zenity, emphasized the shift from theoretical to operational risks in AI supply chain security. The industry must recognize AI agents as privileged actors that require strict oversight to prevent such vulnerabilities in the future.

The Hacker News Tags:AI security, Cline CLI, code execution, GitHub security, npm package, OpenClaw, OpenID Connect, software vulnerabilities, supply chain attack, token compromise

Post navigation

Previous Post: Jenkins Security Flaws Pose Major XSS Threats
Next Post: NIST’s Single Photon Chip Boosts Quantum Security

Related Posts

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks The Hacker News
WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories The Hacker News
npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels The Hacker News
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling The Hacker News
15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign The Hacker News
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News