Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges
A critical unauthenticated remote-code execution bug (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access was probed and targeted within 24 hours of a public proof-of-concept, exposing thousands of internet-facing instances. Organizations should treat exposed BeyondTrust deployments as emergency patching and containment priorities, applying access restrictions, WAF/ACL rules, and focused threat-hunting while verifying remediation.
Global: OpenClaw plugin marketplace compromised by supply‑chain poisoning of AI skills
Researchers report that hundreds of malicious 'skills' were uploaded to OpenClaw’s ClawHub, delivering backdoors and credential‑theft routines. Separately discovered operational exposures — including internet‑reachable gateways, leaked API tokens and an OpenClaw CVE patched in a maintenance release — magnify the risk of large‑scale compromise across agent deployments.
Critical SolarWinds Web Help Desk Flaw Exploited; CISA Orders Rapid Patching
A critical unauthenticated remote code execution bug in SolarWinds Web Help Desk (WHD) rooted in AjaxProxy deserialization is being exploited in the wild and was added to CISA’s Known Exploited Vulnerabilities list, triggering compressed federal remediation deadlines. The listing arrived alongside other high-priority KEV additions this patch cycle, reinforcing that administrative consoles and legacy proxy components are high-risk and require immediate patching and network controls.
Security flaws in popular open-source AI assistant expose credentials and private chats
Researchers discovered that internet-accessible instances of the open-source assistant Clawdbot can leak sensitive credentials and conversation histories when misconfigured. The exposure enables attackers to harvest API keys, impersonate users, and in one test led to extracting a private cryptographic key within minutes.

OpenClaw: Widespread Intrusions Hit Chinese Tech Startups
Security research ties the OpenClaw campaign to a coordinated compromise of its extension ecosystem and widely exposed runtime credentials, which allowed backdoors and token theft to spread across developer environments. Startups and investors have already started emergency containment — rotating tokens, patching gateways, and pausing sensitive deal activity — and the incident will accelerate demand for developer‑centric, enterprise-grade security controls.
U.S.: Moltbook and OpenClaw reveal how viral AI prompts could become a major security hazard
An emergent ecosystem of semi‑autonomous assistants and a public social layer for agent interaction has created a realistic route for malicious instruction sets to spread; researchers have found hundreds of internet‑reachable deployments, dozens of prompt‑injection incidents, and a large backend leak of API keys and private data. Centralized providers can still interrupt campaigns today, but improving local model parity and nascent persistence projects mean that the defensive window is narrowing fast.

Langflow: Critical RCE Exploited Within a Day of Patch
Langflow suffered unauthenticated remote code execution that attackers weaponized roughly twenty hours after the fix shipped, enabling credential theft and potential supply-chain staging. Immediate action: rotate secrets, isolate pipelines, and hunt for indicator overlaps across CI/CD and cloud services.

Anthropic's Claude Code: Flaws Threaten Developer Devices and Team Keys
Check Point disclosed critical flaws in Anthropic's Claude Code that allowed silent execution of commands and API key theft from cloned repositories. The issue sits within a broader, systemic risk: reasoning‑based developer tooling, agent connectors, and repo-applied configs expand the attack surface—so organizations must urgently harden CI/CD, key management, and repository execution defaults.