
OpenClaw: Widespread Intrusions Hit Chinese Tech Startups
Context and technical vector
Researchers identified a coordinated intrusion campaign that weaponized the OpenClaw ecosystem by poisoning marketplace extensions and exploiting runtime deployment weaknesses to harvest credentials, browser artifacts and local files. Malicious packages uploaded to the official plugin marketplace (ClawHub) typically masqueraded as benign dependencies or automation helpers; when executed they deployed backdoors and loaders that used runtime‑decrypted payloads to evade cursory review. Multiple teams observed overlapping infrastructure — shared domains and IPs — and vendor audits reported hundreds of flagged skills (reports varied, for example 472 vs 341 in different samples), indicating persistent, large‑scale abuse rather than isolated uploads.
Scope of exposures
Independent scans and configuration audits amplified the risk beyond malicious uploads: researchers found hundreds of internet‑reachable OpenClaw gateway/admin endpoints, backend misconfigurations that exposed roughly 1.5 million API tokens and about 35,000 email addresses, and unvetted public feeds where prompt‑injection fragments appeared in measurable fractions of posts. A client‑side gateway vulnerability (tracked as CVE‑2026‑25253) let a crafted webpage steal a session credential and escalate it into full gateway authentication and arbitrary host command execution; maintainers shipped a patch in OpenClaw 2026.1.29 to address that vector.
Operational impact on startups and investors
For affected startups, the pragmatic fallout centered on developer workflows and privileged connectors rather than bulk consumer records: teams reported anomalous access, forced lockdowns of code repositories and CI/CD pipelines, and rapid rotation of exposed tokens. Platform providers and cloud hosts ran configuration audits and tightened defaults, while venture firms initiated enhanced technical due diligence and in some cases paused deal activity pending forensic attestations. Those changes have already increased short‑term operational costs and are reshaping diligence and procurement expectations for early‑stage teams.
Tactics, mitigations and recommendations
Observed attacker techniques combined marketplace poisoning, social engineering lures (fake installers and prompts to paste commands), and exploitation of exposed tokens and reachable gateways. Immediate mitigations that teams have applied include upgrading to patched OpenClaw releases, revoking and rotating API keys and tokens, inventorying internet‑reachable instances, and restricting gateway access via IP filtering or VPN-only controls. Medium‑term platform fixes recommended by researchers include cryptographic signing of skills and builds, stronger provenance and identity gates for publishers, sandboxing connectors, least‑privilege action scopes, and automated static/dynamic analysis for marketplace submissions.
Broader implications and trajectory
This incident exposes a multiplying risk where small marketplace injections or repo‑level configs can be fetched and reassembled across many agents, enabling secrets exfiltration and lateral movement into build systems. The combined set of supply‑chain and runtime failures shortens detection windows and amplifies attacker leverage against developer tooling, accelerating market demand for managed developer security, secrets management and attestation services. Regulators, buyers and investors will increasingly bake technical gating and forensic requirements into procurement and term sheets, altering the capital and risk calculus for nimble startups.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

OpenClaw Use Curbed Across Chinese State Agencies and Banks
Chinese authorities have ordered state bodies and major banks to halt installing OpenClaw on workplace devices after researchers exposed a coordinated supply‑chain poisoning campaign, reachable gateways and a client‑side gateway flaw (CVE‑2026‑25253). The advisory has already paused pilots, spurred token rotations and audits, and is likely to accelerate preference for vetted domestic AI stacks while complicating access for foreign vendors.
OpenClaw Drives Mass Adoption in China as Big Tech Mobilizes
OpenClaw adoption in China has surged: Baidu and Tencent staged public setup events and embedded the agent into high‑traffic endpoints while security incidents and internal advisories forced enterprises to pause rollouts and apply emergency patches. The result is a rapid consumerization that expands commercialization paths but also exposes systemic supply‑chain and runtime vulnerabilities that will shape procurement and regulation in the coming quarters.

OpenClaw Fuels Surge in China Demand for Secondhand Macs
OpenClaw’s breakout distribution across China — amplified by platform pushes from Baidu and Tencent — has translated into higher reseller buyback prices and stronger demand for energy‑efficient M‑series Macs as consumers and communities seek isolated endpoints. At the same time, disclosed supply‑chain and gateway vulnerabilities (including a client‑side CVE) and internal advisories to pause installations are bifurcating demand: a consumer-led rush into refurbished devices and hosted isolated instances, versus tightened enterprise procurement and remediation workstreams.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Global: OpenClaw plugin marketplace compromised by supply‑chain poisoning of AI skills
Researchers report that hundreds of malicious 'skills' were uploaded to OpenClaw’s ClawHub, delivering backdoors and credential‑theft routines. Separately discovered operational exposures — including internet‑reachable gateways, leaked API tokens and an OpenClaw CVE patched in a maintenance release — magnify the risk of large‑scale compromise across agent deployments.

US–Israel Strikes Trigger Widespread Cyber Operations Against Iran
Coordinated US and Israeli kinetic strikes were followed by broad cyber campaigns that disrupted Iranian networks — including a reported nationwide internet outage lasting at least 48+ hours — and targeted intrusions against energy, aviation and government systems. U.S. authorities raised domestic readiness while investigators traced parallel long‑duration espionage activity spanning dozens of countries, creating a complex mix of denial, disruption and intelligence‑collection operations amid noisy attribution.

Anthropic's Claude Code: Flaws Threaten Developer Devices and Team Keys
Check Point disclosed critical flaws in Anthropic's Claude Code that allowed silent execution of commands and API key theft from cloned repositories. The issue sits within a broader, systemic risk: reasoning‑based developer tooling, agent connectors, and repo-applied configs expand the attack surface—so organizations must urgently harden CI/CD, key management, and repository execution defaults.
Runlayer introduces enterprise governance for OpenClaw agent security
Runlayer released a commercial governance layer that discovers unmanaged OpenClaw agents and enforces low-latency controls to stop dangerous tool calls and credential exfiltration. The product combines endpoint/cloud discovery, SIEM integration, identity-aware policy enforcement and sub-100ms interception; internal tests and customer pilots show large gains against prompt-based takeovers and exfiltration chains.