Recently, the AI community has been abuzz with the intelligent agent OpenClaw (originally named Clawdbot), which has attracted significant attention due to its powerful "proactive automation" capabilities. However, along with the popularity comes a major security risk. According to the security team of the password management tool 1Password, attackers have already exploited vulnerabilities in the platform's mechanisms to launch precise malware attacks on macOS users.

OpenClaw was originally designed to free users from handling tasks such as emails and calendars independently, but its "skills" files used for learning have become an entry point for hackers. Attackers have disguised malicious code as legitimate integration tutorials, tricking users into running specific Shell commands during setup. Once executed, the script modifies system settings and removes the built-in "file quarantine" markers in macOS, allowing information-stealing viruses to bypass security checks and infiltrate the system seamlessly.
This type of malware is extremely stealthy, with its core goal being to silently steal high-value sensitive user data. Whether it's browser login sessions, auto-filled passwords, or developers' SSH keys and API tokens, all are at risk. Even the currently advocated "Model Context Protocol (MCP)" struggles to provide effective defense against this kind of social engineering fraud. Experts now warn users to be vigilant about integration scripts from non-official sources while using AI tools to improve efficiency, to prevent loss of system permissions.
Key Points:
🚨 Security Alert: The popular AI agent OpenClaw has serious vulnerabilities, and attackers are using it to spread data-extraction viruses to macOS users.
🧬 Attack Method: Hackers disguise "skills" files to trick users into executing malicious Shell commands, thereby forcing the disablement of macOS's security protection mechanisms.
⚠️ Data Threat: The virus focuses on silently stealing passwords, session Cookies, and developers' API tokens, potentially leading to full penetration of personal and corporate cloud assets.
