Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Devastating Supply Chain Attack: OpenClaw AI Agent Platform Compromised via Cline CLI


A Devastating Supply Chain Attack: OpenClaw AI Agent Platform Compromised via Cline CLI

In a shocking incident, the OpenClaw AI agent platform was compromised via the popular open-source AI coding assistant Cline, exposing over 135,000 instances to the internet. The attack highlights the vulnerabilities present in software development and supply chain security, emphasizing the need for robust security measures, transparency, and responsible innovation in AI development.

  • Over 135,000 instances of OpenClaw AI agent platform were exposed to the internet due to a supply chain attack.
  • A compromised token was used to install OpenClaw on unsuspecting users' machines without their knowledge or consent.
  • A prompt injection vulnerability in Cline was discovered earlier this month, but its disclosure was not properly handled.
  • The incident highlights the vulnerabilities present in software development processes and supply chain security.
  • It emphasizes the importance of robust security measures, transparent disclosure practices, and responsible innovation.



  • The tech world was recently hit with a devastating supply chain attack that exposed over 135,000 instances of the OpenClaw AI agent platform to the internet. The incident occurred when an unauthorized party compromised the npm package for the popular open-source AI coding assistant Cline, installing OpenClaw on unsuspecting users' machines without their knowledge or consent.

    According to a security advisory issued by Cline's maintainers, the attack took place on February 17, during which time an "unauthorized party" used a compromised token to publish an update to Cline CLI that installed OpenClaw - a notorious AI agent platform known for its potential misuse in cybercrime and malicious activities. The compromise occurred within an eight-hour window between 3:26 AM PT and 11:30 AM PT, affecting users who installed Cline CLI during this time period.

    The incident was further complicated by the revelation that security researcher Adnan Khan had discovered a prompt injection vulnerability in Cline earlier this month, which could have been exploited for malicious purposes. However, it appears that Khan's discovery was not properly disclosed, and an unauthorized party took advantage of the vulnerability to install OpenClaw on unsuspecting users' machines.

    The maintainers of Cline CLI have since revoked the compromised token, and npm publishing now uses OIDC provenance via GitHub Actions to prevent similar incidents in the future. However, users who installed Cline CLI during the affected time period are still at risk of having OpenClaw installed on their machines, and it is strongly recommended that they update to a fixed version (2.4.0 or higher) and check their environment for any surprise installations.

    The incident highlights the vulnerabilities present in the software development process, particularly with regards to supply chain security. The fact that an unauthorized party was able to compromise Cline's npm package and install OpenClaw on unsuspecting users' machines without detection is a stark reminder of the importance of robust security measures and transparent disclosure practices.

    Furthermore, this incident sheds light on the potential misuse of AI agent platforms like OpenClaw. As AI technology continues to advance at an unprecedented rate, it is becoming increasingly important for developers and users to prioritize security and responsible innovation. The consequences of allowing malicious actors to exploit vulnerabilities in AI systems can be severe, ranging from data breaches and cyber-attacks to compromised national security.

    In light of this incident, it is essential that the tech community takes a proactive approach to addressing supply chain security concerns. This includes implementing robust security measures, such as regular vulnerability assessments and penetration testing, as well as promoting transparency and responsible disclosure practices among developers and users.

    Ultimately, the devastating supply chain attack on Cline CLI serves as a wake-up call for the tech industry, highlighting the need for increased vigilance and cooperation to prevent similar incidents in the future. By prioritizing security, transparency, and responsible innovation, we can ensure that AI technologies are developed and deployed in ways that benefit society as a whole.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Devastating-Supply-Chain-Attack-OpenClaw-AI-Agent-Platform-Compromised-via-Cline-CLI-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2026/02/20/openclaw_snuck_into_cline_package/

  • https://netcrook.com/cline-openclaw-supply-chain-attack/

  • https://www.endorlabs.com/learn/supply-chain-attack-targeting-cline-installs-openclaw


  • Published: Fri Feb 20 15:13:32 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us