A novel software supply chain attack is exploiting the open-source ecosystem of the OpenClaw AI assistant. Threat actors have flooded the ClawHub marketplace with hundreds of malicious "skills," which are community-contributed plugins that extend the AI's capabilities. These skills, discovered by researchers at KOI Security and SlowMist, appear legitimate but contain malicious code designed to steal credentials, cryptocurrency wallets, and other sensitive information. The attack works by tricking users into downloading and executing malware, such as the Atomic Stealer infostealer, as part of the skill's installation prerequisites. The incident highlights a new frontier for supply chain attacks within the burgeoning AI agent ecosystem, exploiting user trust in open platforms. In response, OpenClaw has partnered with VirusTotal to implement automated security scanning for all marketplace submissions.
Prerequisites section of a malicious skill's documentation instructs the user to download and run a malicious file from an external source like GitHub.The attack chain leverages the user's trust in the AI assistant's ecosystem and their desire to add new functionality.
solana-wallet-tracker or youtube-summarize-pro, and publishes it on the open ClawHub marketplace. (T1195.002 - Compromise Software Supply Chain: Compromise Software Distribution)README file contains a step that instructs the user to download a supposed dependency. This is presented as a normal part of the setup process.T1204.002 - Malicious File)T1041 - Exfiltration Over C2 Channel)This attack vector is particularly insidious because it exploits the open and collaborative nature of modern AI platforms. The lack of a mandatory security review process for published skills created a significant vulnerability that threat actors were quick to exploit.
Implementing application allow-listing would prevent the unauthorized malware downloaded by the user from running.
Mapped D3FEND Techniques:
Running the AI assistant and its skills in a sandbox would limit its ability to access and steal sensitive files from the host system.
Mapped D3FEND Techniques:
Educating users not to download and execute arbitrary files from the internet, even if instructed by a seemingly legitimate application, is a crucial defense.
For a platform like ClawHub, implementing automated dynamic analysis (sandboxing) for every submitted skill is a critical security gate. Before a skill is made public, it should be automatically installed and run in an isolated, instrumented environment. The sandbox would monitor the skill's behavior, such as file system access, network connections, and process creation. For the malicious skills in this campaign, this process would immediately flag suspicious activity. For example, a 'youtube-summarize-pro' skill should not be attempting to access keychain files, read browser cookies, or make outbound connections to unknown IP addresses. By analyzing these behaviors, the platform can automatically reject malicious skills before they ever pose a risk to users. This D3FEND technique shifts the security burden from the end-user to the platform provider, creating a much safer ecosystem.
End-users of AI assistants like OpenClaw must adopt a defensive posture through application hardening. The core principle is to run the AI assistant with the least privilege necessary for it to function. This can be achieved by running the application in a container (e.g., Docker) or a dedicated, non-privileged user account with restricted file system access. By default, the AI assistant should be denied access to sensitive user directories such as ~/Documents, ~/Downloads, and especially cryptocurrency wallet locations or browser profile folders. When a skill requires access to a specific file or folder, the user should have to explicitly grant that permission for that session only. This configuration would prevent an information stealer like Atomic Stealer, delivered via a malicious skill, from being able to find and exfiltrate the valuable data it is designed to steal.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats