Recently, the well-known self-hosted AI agent framework OpenClaw (previously known as Clawdbot) suffered a serious supply chain attack. The cybersecurity platform VirusTotal revealed in its latest blog post that the extension platform of the framework, ClawHub, was infected with a large number of malicious software disguised as useful tools.

Attack Details: Trojan Horses Disguised as "Legitimate Skills"
Investigations showed that attackers used OpenClaw's ability to execute shell commands, manipulate files, and make network requests to disguise trojan programs and data theft programs as community-developed "skills."
Most Affected: A user named "hightower6eu" uploaded more than 300 infected skills, including tools disguised as "Yahoo Finance" or "Google Workspace."
Risks: These skills appear clean but actually trick the agent into downloading and running external payloads, including the notorious Atomic Stealer Trojan for macOS.
Enhanced Defense: Collaboration with VirusTotal and Gemini Technology
To address this crisis, OpenClaw founder Peter Steinberger announced that emergency security measures have been taken. Currently, all skills on ClawHub will be automatically scanned by VirusTotal's AI-based "Code Insight" (powered by the Google Gemini platform).
Dynamic Monitoring: The system automatically analyzes whether a skill involves downloading external files, accessing sensitive data, or performing unsafe operations.
Classification and Handling: Harmless skills are automatically approved, suspicious ones are flagged with warnings, malicious ones are immediately blocked, and all active skills are rescan daily.
Expert Oversight: The company has hired Jamieson O'Reilly, founder of Dvuln, as a senior security advisor, dedicated to building security safeguards for AI agents.
