
OpenClaw: Widespread Intrusions Hit Chinese Tech Startups
Context and technical vector
Researchers identified a coordinated intrusion campaign that weaponized the OpenClaw ecosystem by poisoning marketplace extensions and exploiting runtime deployment weaknesses to harvest credentials, browser artifacts and local files. Malicious packages uploaded to the official plugin marketplace (ClawHub) typically masqueraded as benign dependencies or automation helpers; when executed they deployed backdoors and loaders that used runtime‑decrypted payloads to evade cursory review. Multiple teams observed overlapping infrastructure — shared domains and IPs — and vendor audits reported hundreds of flagged skills (reports varied, for example 472 vs 341 in different samples), indicating persistent, large‑scale abuse rather than isolated uploads.
Scope of exposures
Independent scans and configuration audits amplified the risk beyond malicious uploads: researchers found hundreds of internet‑reachable OpenClaw gateway/admin endpoints, backend misconfigurations that exposed roughly 1.5 million API tokens and about 35,000 email addresses, and unvetted public feeds where prompt‑injection fragments appeared in measurable fractions of posts. A client‑side gateway vulnerability (tracked as CVE‑2026‑25253) let a crafted webpage steal a session credential and escalate it into full gateway authentication and arbitrary host command execution; maintainers shipped a patch in OpenClaw 2026.1.29 to address that vector.
Operational impact on startups and investors
For affected startups, the pragmatic fallout centered on developer workflows and privileged connectors rather than bulk consumer records: teams reported anomalous access, forced lockdowns of code repositories and CI/CD pipelines, and rapid rotation of exposed tokens. Platform providers and cloud hosts ran configuration audits and tightened defaults, while venture firms initiated enhanced technical due diligence and in some cases paused deal activity pending forensic attestations. Those changes have already increased short‑term operational costs and are reshaping diligence and procurement expectations for early‑stage teams.
Tactics, mitigations and recommendations
Observed attacker techniques combined marketplace poisoning, social engineering lures (fake installers and prompts to paste commands), and exploitation of exposed tokens and reachable gateways. Immediate mitigations that teams have applied include upgrading to patched OpenClaw releases, revoking and rotating API keys and tokens, inventorying internet‑reachable instances, and restricting gateway access via IP filtering or VPN-only controls. Medium‑term platform fixes recommended by researchers include cryptographic signing of skills and builds, stronger provenance and identity gates for publishers, sandboxing connectors, least‑privilege action scopes, and automated static/dynamic analysis for marketplace submissions.
Broader implications and trajectory
This incident exposes a multiplying risk where small marketplace injections or repo‑level configs can be fetched and reassembled across many agents, enabling secrets exfiltration and lateral movement into build systems. The combined set of supply‑chain and runtime failures shortens detection windows and amplifies attacker leverage against developer tooling, accelerating market demand for managed developer security, secrets management and attestation services. Regulators, buyers and investors will increasingly bake technical gating and forensic requirements into procurement and term sheets, altering the capital and risk calculus for nimble startups.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Global: OpenClaw plugin marketplace compromised by supply‑chain poisoning of AI skills
Researchers report that hundreds of malicious 'skills' were uploaded to OpenClaw’s ClawHub, delivering backdoors and credential‑theft routines. Separately discovered operational exposures — including internet‑reachable gateways, leaked API tokens and an OpenClaw CVE patched in a maintenance release — magnify the risk of large‑scale compromise across agent deployments.

US–Israel Strikes Trigger Widespread Cyber Operations Against Iran
Coordinated US and Israeli kinetic strikes were followed by broad cyber campaigns that disrupted Iranian networks — including a reported nationwide internet outage lasting at least 48+ hours — and targeted intrusions against energy, aviation and government systems. U.S. authorities raised domestic readiness while investigators traced parallel long‑duration espionage activity spanning dozens of countries, creating a complex mix of denial, disruption and intelligence‑collection operations amid noisy attribution.

Anthropic's Claude Code: Flaws Threaten Developer Devices and Team Keys
Check Point disclosed critical flaws in Anthropic's Claude Code that allowed silent execution of commands and API key theft from cloned repositories. The issue sits within a broader, systemic risk: reasoning‑based developer tooling, agent connectors, and repo-applied configs expand the attack surface—so organizations must urgently harden CI/CD, key management, and repository execution defaults.
Runlayer introduces enterprise governance for OpenClaw agent security
Runlayer released a commercial governance layer that discovers unmanaged OpenClaw agents and enforces low-latency controls to stop dangerous tool calls and credential exfiltration. The product combines endpoint/cloud discovery, SIEM integration, identity-aware policy enforcement and sub-100ms interception; internal tests and customer pilots show large gains against prompt-based takeovers and exfiltration chains.

Google DeepMind restricts Antigravity access, cutting OpenClaw integrations
Google DeepMind suspended Antigravity access for OpenClaw-based integrations, citing abusive usage and service degradation. The action blocks a path to Gemini tokens and accelerates a shift toward closed, vertically controlled agent stacks.

CrowdStrike: AI-Driven Attacks Surge and Collapse Detection Windows
CrowdStrike reports an 89% rise in AI-enabled attacks and an average breakout time of 29 minutes (fastest observed: 27 seconds). Independent industry reporting (IBM, Amazon, vendor incident timelines) shows related but differently scoped increases — compressed exploit windows, automated reconnaissance campaigns that commandeered hundreds of perimeter devices, and rapid moves from disclosure to active targeting — underscoring an urgent need for cross-source telemetry, identity-first controls, and faster containment playbooks.
Global cyber-espionage campaign breaches sensitive targets in 37 countries
A coordinated, long-duration hacking campaign has established persistent access to high-value government and diplomatic networks in 37 countries, prioritizing intelligence collection over immediate disruption. The operation leverages polymorphic tooling, credential harvesting and social-engineering techniques that complicate detection and raise urgent needs for identity-focused defenses and cross-border incident coordination.