Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OpenClaw Security Flaw Allows AI Agent Hijacking

OpenClaw Security Flaw Allows AI Agent Hijacking

Posted on February 28, 2026 By CWS

OpenClaw has recently addressed a critical security flaw that could have allowed unauthorized websites to gain control over local AI agents through WebSocket connections. Reported by Oasis Security, this vulnerability, named ‘ClawJacked,’ existed within the core OpenClaw system itself, excluding any plugins or extensions.

The identified threat scenario involves a developer running OpenClaw on a laptop, with the gateway operating via a local WebSocket server secured by a password. A malicious website could exploit this setup if a developer visits such a site through social engineering techniques. Upon accessing the site, malicious JavaScript could establish a WebSocket connection to the local OpenClaw gateway, bypassing rate-limiting to brute-force the password. Achieving admin-level access, the script could then register as a trusted device without user approval, gaining full control over the AI agent.

Exploiting Local Connections

Oasis Security highlighted how web browsers allow cross-origin WebSocket connections, meaning JavaScript from any site can silently connect to local services like OpenClaw, without user awareness. This is compounded by the gateway’s relaxed security for local connections, automatically approving new device registrations without user confirmation.

Following responsible disclosure, OpenClaw issued a patch within 24 hours, version 2026.2.25, dated February 26, 2026. Users are urged to update their systems immediately, regularly review AI agent access permissions, and implement stringent identity governance for non-human entities.

Broader Security Implications

This incident coincides with increasing scrutiny of OpenClaw’s security, exacerbated by AI agents’ broad access to diverse systems, potentially amplifying the impact of any breach. Reports from Bitsight and NeuralTrust indicate that internet-exposed OpenClaw instances could serve as attack vectors, with integrations expanding potential damage through embedded prompt injections in content.

Additionally, OpenClaw recently patched a log poisoning vulnerability that allowed attackers to inject malicious content into logs via WebSocket requests, which could be misinterpreted by the AI agent, leading to unintended consequences.

Recent Threats and Mitigation

OpenClaw’s vulnerabilities aren’t isolated. Recently, the platform faced multiple security issues, ranging from remote code execution to authentication bypass, addressed in various updates. The rise of OpenClaw in enterprises necessitates a nuanced security approach to both traditional and AI-specific vulnerabilities.

Meanwhile, malicious skills on ClawHub, OpenClaw’s skill marketplace, have been used to distribute the Atomic Stealer malware, highlighting the need for caution when installing new skills. Users are advised to audit skills, avoid unnecessary credential sharing, and monitor behavior closely.

Microsoft has also cautioned against unprotected OpenClaw deployments, which could lead to credential exposure and system compromise. It advises deploying OpenClaw in isolated environments with non-privileged credentials and continuous monitoring to mitigate risks.

The ongoing security challenges underscore the importance of vigilance and proactive measures in securing AI-driven platforms like OpenClaw against emerging threats.

The Hacker News Tags:AI agents, AI ecosystem, AI security, ClawJacked, Cybersecurity, digital safety, Hijacking, malicious sites, Oasis Security, OpenClaw, security patch, software update, threat model, Vulnerability, WebSocket

Post navigation

Previous Post: Hackers Exploit Windows File Explorer for Malware Delivery

Related Posts

Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The Hacker News
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
Why Data Security and Privacy Need to Start in Code Why Data Security and Privacy Need to Start in Code The Hacker News
DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw Security Flaw Allows AI Agent Hijacking
  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study
  • Metasploit Update: New Exploits Target Linux, BeyondTrust

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw Security Flaw Allows AI Agent Hijacking
  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study
  • Metasploit Update: New Exploits Target Linux, BeyondTrust

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News