![]() |
Koi Security’s security audit of 2,857 skills on ClawHub found 341 malicious skills via multiple campaigns. Users are exposed to new supply chain threats.
ClawHub is a marketplace made to help OpenClaw users in finding and installing third-party skills. It is a part of the OpenClaw project, a self-hosted artificial intelligence (AI) assistant aka Moltbot and Clawdbot.
Koi Security’s analysis with OpenClaw bot “Alex” revealed that 335 skills use malicious pre-requisite to install an Apple macOS stealer called (Atomic Stealer). The activity goes by the code name ClawHavoc.
According to Koi research Oren Yomtov, “You install what looks like a legitimate skill – maybe solana-wallet-tracker or youtube-summarize-pro. The skill’s documentation looks professional. But there’s a ‘Prerequisites’ section that says you need to install something first.”
Instruction steps:
Windows users are asked to download file “openclaw-agent.zip” from a GitHub repository.
macOS users are asked to copy an installation script hosted at glot[.]io and paste it in the Terminal application.
Threat actors are targeting macOS users because of an increase in purchase of Mac Minus to use the AI assistant 24×7.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
