
A safety audit of two,857 abilities on ClawHub has discovered 341 malicious abilities throughout a number of campaigns, in line with new findings from Koi Safety, exposing customers to new provide chain dangers.
ClawHub is a market designed to make it simple for OpenClaw customers to search out and set up third-party abilities. It is an extension to the OpenClaw mission, a self-hosted synthetic intelligence (AI) assistant previously referred to as each Clawdbot and Moltbot.
The evaluation, which Koi carried out with the assistance of an OpenClaw bot named Alex, discovered that 335 abilities use pretend pre-requisites to put in an Apple macOS stealer named Atomic Stealer (AMOS). This set has been codenamed ClawHavoc.
“You put in what appears like a legit talent – perhaps solana-wallet-tracker or youtube-summarize-pro,” Koi researcher Oren Yomtov mentioned. “The talent’s documentation appears skilled. However there is a ‘Conditions’ part that claims you could set up one thing first.”
This step entails directions for each Home windows and macOS programs: On Home windows, customers are requested to obtain a file referred to as “openclaw-agent.zip” from a GitHub repository. On macOS, the documentation tells them to repeat an set up script hosted at glot[.]io and paste it into the Terminal app. The focusing on of macOS isn’t any coincidence, as studies have emerged of individuals shopping for Mac Minis to run the AI assistant 24×7.
Current throughout the password-protected archive is a trojan with keylogging performance to seize API keys, credentials, and different delicate knowledge on the machine, together with people who the bot already has entry to. Alternatively, the glot[.]io script comprises obfuscated shell instructions to fetch next-stage payloads from an attacker-controlled infrastructure.
This, in flip, entails reaching out to a different IP handle (“91.92.242[.]30”) to retrieve one other shell script, which is configured to contact the identical server to acquire a common Mach-O binary that reveals traits in line with Atomic Stealer, a commodity stealer obtainable for $500-1000/month that may harvest knowledge from macOS hosts.

In response to Koi, the malicious abilities masquerade as
- ClawHub typosquats (e.g., clawhub, clawhub1, clawhubb, clawhubcli, clawwhub, cllawhub)
- Cryptocurrency instruments like Solana wallets and pockets trackers
- Polymarket bots (e.g., polymarket-trader, polymarket-pro, polytrading)
- YouTube utilities (e.g., youtube-summarize, youtube-thumbnail-grabber, youtube-video-downloader)
- Auto-updaters (e.g., auto-updater-agent, replace, updater)
- Finance and social media instruments (e.g., yahoo-finance-pro, x-trends-tracker)
- Google Workspace instruments claiming integrations with Gmail, Calendar, Sheets, and Drive
- Ethereum fuel trackers
- Misplaced Bitcoin finders
As well as, the cybersecurity firm mentioned it recognized abilities that conceal reverse shell backdoors inside useful code (e.g., better-polymarket and polymarket-all-in-one), or exfiltrate bot credentials current in “~/.clawdbot/.env” to a webhook[.]website (e.g., rankaj).

The event coincides with a report from OpenSourceMalware, which additionally flagged the identical ClawHavoc marketing campaign focusing on OpenClaw customers.
“The talents masquerade as cryptocurrency buying and selling automation instruments and ship information-stealing malware to macOS and Home windows programs,” a safety researcher who goes by the web alias 6mile mentioned.
“All these abilities share the identical command-and-control infrastructure (91.92.242[.]30) and use refined social engineering to persuade customers to execute malicious instructions, which then steal crypto belongings like change API keys, pockets personal keys, SSH credentials, and browser passwords.”
OpenClaw Provides a Reporting Possibility
The issue stems from the truth that ClawHub is open by default and permits anybody to add abilities. The one restriction at this stage is {that a} writer will need to have a GitHub account that is at the least one week previous.
The problem with malicious abilities hasn’t gone unnoticed by OpenClaw’s creator Peter Steinberger, who has since rolled out a reporting characteristic that permits signed-in customers to flag a talent. “Every consumer can have as much as 20 energetic studies at a time,” the documentation states. “Abilities with greater than 3 distinctive studies are auto-hidden by default.”

The findings underscore how open-source ecosystems proceed to be abused by menace actors, who are actually piggybacking on OpenClaw’s sudden recognition to orchestrate malicious campaigns and distribute malware at scale.
In a report final week, Palo Alto Networks warned that OpenClaw represents what British programmer Simon Willison, who coined the time period immediate injection, describes as a “deadly trifecta” that renders AI brokers susceptible by design on account of their entry to personal knowledge, publicity to untrusted content material, and the flexibility to speak externally.
The intersection of those three capabilities, mixed with OpenClaw’s persistent reminiscence, “acts as an accelerant” and amplifies the dangers, the cybersecurity firm added.
“With persistent reminiscence, assaults are now not simply point-in-time exploits. They turn into stateful, delayed-execution assaults,” researchers Sailesh Mishra and Sean P. Morgan mentioned. “Malicious payloads now not have to set off quick execution on supply. As a substitute, they are often fragmented, untrusted inputs that seem benign in isolation, are written into long-term agent reminiscence, and later assembled into an executable set of directions.”
“This allows time-shifted immediate injection, reminiscence poisoning, and logic bomb–fashion activation, the place the exploit is created at ingestion however detonates solely when the agent’s inner state, objectives, or software availability align.”

