By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
Computing

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

News Room
Last updated: 2026/02/02 at 2:35 PM
News Room Published 2 February 2026
Share
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
SHARE

A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks.

ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills. It’s an extension to the OpenClaw project, a self-hosted artificial intelligence (AI) assistant formerly known as both Clawdbot and Moltbot.

The analysis, which Koi conducted with the help of an OpenClaw bot named Alex, found that 335 skills use fake pre-requisites to install an Apple macOS stealer named Atomic Stealer (AMOS). This set has been codenamed ClawHavoc.

“You install what looks like a legitimate skill – maybe solana-wallet-tracker or youtube-summarize-pro,” Koi researcher Oren Yomtov said. “The skill’s documentation looks professional. But there’s a ‘Prerequisites’ section that says you need to install something first.”

This step involves instructions for both Windows and macOS systems: On Windows, users are asked to download a file called “openclaw-agent.zip” from a GitHub repository. On macOS, the documentation tells them to copy an installation script hosted at glot[.]io and paste it into the Terminal app. The targeting of macOS is no coincidence, as reports have emerged of people buying Mac Minis to run the AI assistant 24×7.

Present within the password-protected archive is a trojan with keylogging functionality to capture API keys, credentials, and other sensitive data on the machine, including those that the bot already has access to. On the other hand, the glot[.]io script contains obfuscated shell commands to fetch next-stage payloads from an attacker-controlled infrastructure.

This, in turn, entails reaching out to another IP address (“91.92.242[.]30”) to retrieve another shell script, which is configured to contact the same server to obtain a universal Mach-O binary that exhibits traits consistent with Atomic Stealer, a commodity stealer available for $500-1000/month that can harvest data from macOS hosts.

Cybersecurity

According to Koi, the malicious skills masquerade as

  • ClawHub typosquats (e.g., clawhub, clawhub1, clawhubb, clawhubcli, clawwhub, cllawhub)
  • Cryptocurrency tools like Solana wallets and wallet trackers
  • Polymarket bots (e.g., polymarket-trader, polymarket-pro, polytrading)
  • YouTube utilities (e.g., youtube-summarize, youtube-thumbnail-grabber, youtube-video-downloader)
  • Auto-updaters (e.g., auto-updater-agent, update, updater)
  • Finance and social media tools (e.g., yahoo-finance-pro, x-trends-tracker)
  • Google Workspace tools claiming integrations with Gmail, Calendar, Sheets, and Drive
  • Ethereum gas trackers
  • Lost Bitcoin finders

In addition, the cybersecurity company said it identified skills that hide reverse shell backdoors inside functional code (e.g., better-polymarket and polymarket-all-in-one), or exfiltrate bot credentials present in “~/.clawdbot/.env” to a webhook[.]site (e.g., rankaj).

The development coincides with a report from OpenSourceMalware, which also flagged the same ClawHavoc campaign targeting OpenClaw users.

“The skills masquerade as cryptocurrency trading automation tools and deliver information-stealing malware to macOS and Windows systems,” a security researcher who goes by the online alias 6mile said.

“All these skills share the same command-and-control infrastructure (91.92.242[.]30) and use sophisticated social engineering to convince users to execute malicious commands, which then steal crypto assets like exchange API keys, wallet private keys, SSH credentials, and browser passwords.”

OpenClaw Adds a Reporting Option

The problem stems from the fact that ClawHub is open by default and allows anyone to upload skills. The only restriction at this stage is that a publisher must have a GitHub account that’s at least one week old.

The issue with malicious skills hasn’t gone unnoticed by OpenClaw’s creator Peter Steinberger, who has since rolled out a reporting feature that allows signed-in users to flag a skill. “Each user can have up to 20 active reports at a time,” the documentation states. “Skills with more than 3 unique reports are auto-hidden by default.”

Cybersecurity

The findings underscore how open-source ecosystems continue to be abused by threat actors, who are now piggybacking on OpenClaw’s sudden popularity to orchestrate malicious campaigns and distribute malware at scale.

In a report last week, Palo Alto Networks warned that OpenClaw represents what British programmer Simon Willison, who coined the term prompt injection, describes as a “lethal trifecta” that renders AI agents vulnerable by design due to their access to private data, exposure to untrusted content, and the ability to communicate externally.

The intersection of these three capabilities, combined with OpenClaw’s persistent memory, “acts as an accelerant” and amplifies the risks, the cybersecurity company added.

“With persistent memory, attacks are no longer just point-in-time exploits. They become stateful, delayed-execution attacks,” researchers Sailesh Mishra and Sean P. Morgan said. “Malicious payloads no longer need to trigger immediate execution on delivery. Instead, they can be fragmented, untrusted inputs that appear benign in isolation, are written into long-term agent memory, and later assembled into an executable set of instructions.”

“This enables time-shifted prompt injection, memory poisoning, and logic bomb–style activation, where the exploit is created at ingestion but detonates only when the agent’s internal state, goals, or tool availability align.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Elon Musk is chatting with his AI bot Grok about his name being in the Epstein f Elon Musk is chatting with his AI bot Grok about his name being in the Epstein f
Next Article Code breakers can win GOLD BAR worth £29,000 by solving tough puzzles & riddles Code breakers can win GOLD BAR worth £29,000 by solving tough puzzles & riddles
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Today's NYT Wordle Hints, Answer and Help for Feb. 3 #1690 – CNET
Today's NYT Wordle Hints, Answer and Help for Feb. 3 #1690 – CNET
News
When the Seattle Seahawks sell, will any tech execs step up for the 12s?
When the Seattle Seahawks sell, will any tech execs step up for the 12s?
Computing
Need to Update Your Wi-Fi Router Settings? Here’s What to Do
Need to Update Your Wi-Fi Router Settings? Here’s What to Do
News
Bad Bunny wins Grammy album of the year ahead of Super Bowl halftime show
Bad Bunny wins Grammy album of the year ahead of Super Bowl halftime show
News

You Might also Like

When the Seattle Seahawks sell, will any tech execs step up for the 12s?
Computing

When the Seattle Seahawks sell, will any tech execs step up for the 12s?

7 Min Read
AI Was Born in a Room Full of People; Its Future Is Plural | HackerNoon
Computing

AI Was Born in a Room Full of People; Its Future Is Plural | HackerNoon

7 Min Read
Analysts Bullish on Mutuum Finance (MUTM) After M Raise and V1 Protocol Launch | HackerNoon
Computing

Analysts Bullish on Mutuum Finance (MUTM) After $20M Raise and V1 Protocol Launch | HackerNoon

9 Min Read
5 Ways Spark 4.1 Moves Data Engineering From Manual Pipelines to Intent-Driven Design | HackerNoon
Computing

5 Ways Spark 4.1 Moves Data Engineering From Manual Pipelines to Intent-Driven Design | HackerNoon

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?