Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

OpenClaw: A DIY AI Bot Farm that's a Security "Dumpster Fire" Awaiting Malicious Activities


OpenClaw, a DIY AI bot farm developed by enthusiasts and researchers, has been marred by security vulnerabilities and malicious skills submitted to its repository. The project's recent security advisories have raised concerns among users and experts alike about the potential risks associated with this project.

  • OpenClaw, a DIY AI bot farm, has issued three high-impact security advisories due to nasty flaws in its codebase.
  • The project has also identified 341 malicious skills (extensions) submitted to ClawHub, a repository for OpenClaw skills.
  • Cyberstorm.MU found flaws in OpenClaw skills and contributed to the project's code with a commit that made TLS 1.3 the default cryptographic protocol.
  • Security experts warn of potential risks associated with OpenClaw, urging developers to take immediate action to address these flaws.
  • The situation highlights the importance of responsible innovation in AI, prioritizing security and taking precautions to prevent malicious activities.



  • OpenClaw, a DIY AI bot farm developed by a team of enthusiasts and researchers, has taken the world by storm with its innovative approach to artificial intelligence. Initially known as Clawdbot, later renamed to Moltbot before settling on the current name OpenClaw, this project has attracted attention from developers with large social media followings like Simon Willison and Andrej Karpathy. The explosion in popularity that followed was swift, with researchers and users alike discovering nasty flaws in the codebase of OpenClaw.

    In the past three days alone, the project has issued three high-impact security advisories: a one-click remote code execution vulnerability, and two command injection vulnerabilities. This has prompted an immediate response from security experts and researchers who are eager to analyze the situation further and understand how these flaws could be exploited by malicious actors. In addition, Koi Security identified 341 malicious skills (OpenClaw extensions) submitted to ClawHub, a repository for OpenClaw skills that's been around for about a month. This was after security researcher Jamieson O'Reilly detailed how it would be trivial to backdoor a skill posted to ClawHub.

    Furthermore, Mauritius-based security outfit Cyberstorm.MU has found flaws in OpenClaw skills. The group contributed to OpenClaw's code with a commit that will make TLS 1.3 the default cryptographic protocol for the gateway the project uses to communicate with external services. This change could potentially provide an entry point for attackers who are familiar with exploiting SSL/TLS vulnerabilities.

    The recent security advisories and the discovery of malicious skills have raised concerns among users and experts alike about the potential risks associated with OpenClaw. It is imperative that the developers of this project take immediate action to address these flaws, ensuring that their creation does not become a platform for nefarious activities. The involvement of large social media influencers in promoting this project has only added fuel to the fire, as many users have been trusting OpenClaw with their credentials and data without realizing the potential risks involved.

    In light of the recent security advisories, it is crucial that developers, researchers, and users exercise extreme caution when dealing with AI-powered personal assistants like OpenClaw. It is also imperative that security experts conduct a thorough analysis of this project to identify any other potential vulnerabilities that could be exploited by malicious actors.

    The situation surrounding OpenClaw serves as a stark reminder of the importance of responsible innovation in the field of artificial intelligence. While the creation of projects like OpenClaw can have far-reaching benefits, it is equally crucial that we prioritize security and take all necessary precautions to prevent these tools from falling into the wrong hands.

    As this story continues to unfold, one thing is clear: OpenClaw has become a security "dumpster fire" that is awaiting malicious activities. It is imperative that everyone involved in this project takes immediate action to address these flaws and ensure that their creation does not become a platform for nefarious activities.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/OpenClaw-A-DIY-AI-Bot-Farm-thats-a-Security-Dumpster-Fire-Awaiting-Malicious-Activities-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2026/02/03/openclaw_security_problems/

  • https://www.theregister.com/2026/02/03/openclaw_security_problems/

  • https://www.msbiro.net/posts/openclaw-security-analysis/

  • https://cisoseries.com/cybersecurity-news-openclaw-targets-clawhub-users-notepad-update-delivers-malware-apt28-attackers-abuse-microsoft-office-zero-day/

  • https://www.fastcompany.com/91485326/openclaw-is-a-major-leap-forward-for-ai-and-a-cybersecurity-nightmare

  • https://cointelegraph.com/news/viral-ai-assistant-clawdbot-risks-leaking-private-messages-credentials

  • https://www.bitdefender.com/en-us/blog/hotforsecurity/moltbot-security-alert-exposed-clawdbot-control-panels-risk-credential-leaks-and-account-takeovers

  • https://www.zdnet.com/article/security-nightmare-moltbot-5-reasons-viral-ai-agent/

  • https://www.techradar.com/pro/security/fake-moltbot-ai-assistant-just-spreads-malware-so-ai-fans-watch-out-for-scams

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/

  • https://gbhackers.com/rustdoor-and-koi-stealer-malware-attack/

  • https://cyberstorm.mu/


  • Published: Tue Feb 3 10:50:05 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us