820 Malicious Skills Found in OpenClaw's ClawHub Marketplace

Malicious Skills in ClawHub Marketplace
OpenClaw's ClawHub marketplace contains over 10,000 installable skills that extend what AI agents can do. Security researchers recently reported that 820 of these skills contain confirmed malware with actual malicious payloads.
Specific Malicious Behaviors Found
The analysis identified concrete malicious components including:
- Keyloggers
- Data-exfiltration scripts
- Hidden shell commands
- Background processes sending files to external servers
These are not just suspicious behaviors or poorly written code, but confirmed malware with malicious payloads.
Security Implications
Installing affected skills could give attackers access to:
- Local files
- Credentials
- Project data
The level of access depends on permissions granted to the AI agent. ClawHub skills function similarly to npm packages or browser extensions, meaning they can execute code and interact with the local environment. This creates supply-chain style security risks where malicious code can be introduced through third-party extensions.
Marketplace Security Concerns
The discovery raises questions about whether AI marketplaces like ClawHub are moving faster than their security models can handle, or if this represents typical growing pains for a new ecosystem. The scale of the issue (820 out of 10,000+ skills) suggests significant security challenges in vetting third-party extensions for AI agents.
📖 Read the full source: r/openclaw
👀 See Also

Wide OpenClaw: Security Risks from Loose Discord Bot Permissions
A security researcher demonstrates how OpenClaw can be exploited when users add the AI assistant bot to their Discord server with excessive permissions, targeting users who grant root/admin access without considering security controls.

A2A Secure: How Developers Built Cryptographic Communication Between OpenClaw Agents
A new protocol enables OpenClaw agents to communicate securely using Ed25519 signatures without shared API keys.

Hidden Audio Signals Hijack Voice AI Systems with 79-96% Success Rate
Research shows imperceptible audio clips can force LALMs to execute unauthorized commands like web searches, file downloads, and email exfiltration with 79-96% success across 13 models including Mistral and Microsoft services.

Why Internal RAG and Doc-Chat Tools Fail Security Audits
Community discusses real-world security and compliance blockers that prevent RAG tools from reaching production.