Global: OpenClaw plugin marketplace compromised by supply‑chain poisoning of AI skills
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
U.S.: Moltbook and OpenClaw reveal how viral AI prompts could become a major security hazard
An emergent ecosystem of semi‑autonomous assistants and a public social layer for agent interaction has created a realistic route for malicious instruction sets to spread; researchers have found hundreds of internet‑reachable deployments, dozens of prompt‑injection incidents, and a large backend leak of API keys and private data. Centralized providers can still interrupt campaigns today, but improving local model parity and nascent persistence projects mean that the defensive window is narrowing fast.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Aqua Security’s Trivy Scanner Hit by Supply‑Chain Compromise
The widely used Trivy vulnerability scanner was altered via stolen credentials, injecting malicious code into CI/CD workflows and exposing pipeline secrets. Immediate secret rotation and tag validation are required; at least 75 action tags and 7 setup tags were modified.
Security flaws in popular open-source AI assistant expose credentials and private chats
Researchers discovered that internet-accessible instances of the open-source assistant Clawdbot can leak sensitive credentials and conversation histories when misconfigured. The exposure enables attackers to harvest API keys, impersonate users, and in one test led to extracting a private cryptographic key within minutes.

AI agent 'Kai Gritun' farms reputation with mass GitHub PRs, raising supply‑chain concerns
Security firm Socket documented an AI-driven account called 'Kai Gritun' that opened 103 pull requests across roughly 95 repositories in days, producing commits and accepted contributions that built rapid, machine-driven trust signals. Researchers warn this 'reputation farming' shortens the timeline to supply‑chain compromise and say defenses must combine cryptographic provenance, identity attestation and automated governance to stop fast-moving agentic influence.

Austria-born OpenClaw’s rapid ascent sparks productivity promise and security warnings
OpenClaw, an open-source desktop AI agent created by an Austrian developer, has drawn rapid developer interest for automating multi-step tasks locally while connecting to large language models — but independent scans and practical tests have revealed hundreds of misconfigured or internet-reachable deployments that can leak bot tokens, API keys, OAuth secrets and full chat transcripts. The combination of broad system access, persistent memory and external connectivity has prompted both excitement about productivity gains and urgent warnings from security researchers and vendors to inventory deployments, lock down network exposure and rotate credentials.

OpenClaw: Widespread Intrusions Hit Chinese Tech Startups
Security research ties the OpenClaw campaign to a coordinated compromise of its extension ecosystem and widely exposed runtime credentials, which allowed backdoors and token theft to spread across developer environments. Startups and investors have already started emergency containment — rotating tokens, patching gateways, and pausing sensitive deal activity — and the incident will accelerate demand for developer‑centric, enterprise-grade security controls.

OpenClaw Use Curbed Across Chinese State Agencies and Banks
Chinese authorities have ordered state bodies and major banks to halt installing OpenClaw on workplace devices after researchers exposed a coordinated supply‑chain poisoning campaign, reachable gateways and a client‑side gateway flaw (CVE‑2026‑25253). The advisory has already paused pilots, spurred token rotations and audits, and is likely to accelerate preference for vetted domestic AI stacks while complicating access for foreign vendors.