Web Analytics
Cryptopolitan
2026-02-09 09:10:31

ClawHub hosts AI agent skills enabling supply chain attacks

ClawHub may be hosting supply chain attacks through new AI agent skills. Some of the skills contain malware to steal credentials and potentially affect accounts and crypto wallets. ClawHub, the marketplace for OpenClaw AI agent skills, is hosting multiple malicious skills. The supply chain attack may be stealing credentials, potentially affecting crypto wallets. Security researchers from SlowMist reviewed over 400 potential compromised skills, revealing organized attacks targeting specific domains. Skills like X Trends hide a backdoor download, which can then send credentials to the threat actor. The SlowMist research builds on a previous discovery by KOI Security, discovering 341 malicious skills among a total of 2,857 bot skills in the marketplace. Later analysis by SlowMist discovered up to 472 malicious skills, though the number can still vary. ClawHub conceals stealers in hundreds of skills Earlier, Koi Research conducted AI-assisted research using an OpenClaw bot named Alex. The bot found 335 skills that were used to push the Atomic Stealer on macOS. “ You install what looks like a legitimate skill – maybe solana-wallet-tracker or youtube-summarize-pro,” Koi researcher Oren Yomtov said. “The skill’s documentation looks professional. But there’s a ‘Prerequisites’ section that says you need to install something first.” A Windows exploit is also active, calling users to download additional files from a GitHub repository. The supply chain attack also includes a keylogger, which can steal multiple credentials, including potentially uncovering crypto wallets. As Cryptopolitan reported earlier, OpenClaw agents are still in their early stages and are displaying unexpected behavior. Adoption is growing daily, posing new risks in cybersecurity and agent behaviors. SlowMist continues tracking ClawHub skills for new threats The recent supply chain attack may not be a one-off event. ClawHub is a relatively new space, attracting a large number of developers. SlowMist will be tracking the space as a source of supply chain attacks. The platform still lacks formal review mechanisms, allowing widely used skills to be infiltrated. There are still no clear reports of crypto theft through ClawHub. Previously, the public skills repo has contained malicious prompts linked to attempted crypto stealing. In the future, SlowMist will issue real-time alerts via its MistEye service to detect new malicious skills on ClawHub. SlowMist has also identified an IP address that is reused in the malicious attacks. According to theat records, the IP 91.92.242.30 is historically linked to the Poseidon hacker group, known for extortion and data theft. For end users, researchers advise against trusting the installation steps in new skills and to audit any commands that require copying and pasting. A common-sense preview of prompts is also a good check, looking for prompts asking for system passwords or other secure access. Users may wait for official channels and avoid installations from unknown sources. Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.