SlowMist: ClawHub is gradually becoming a new target for attackers to carry out supply chain poisoning

robot
Abstract generation in progress

DeepTech TechFlow News, February 09 — SlowMist Security Team has discovered that the plugin center ClawHub of the open-source AI Agent project OpenClaw is under a large-scale supply chain poisoning attack. The attacker disguises the “dependency installation/initialization” step in the SKILL.md file, using Base64 encoding to hide malicious commands, implementing a “two-stage” attack chain.

Security scans have identified 341 malicious skills, which steal user passwords, collect host information and documents, and upload data to the attacker’s server. The malicious infrastructure is linked to the Poseidon hacking group.

Protection recommendations:

  • Audit all “installation steps” in SKILL.md
  • Be cautious of prompts requesting system password input
  • Only obtain dependencies and tools from official channels

SlowMist has issued an early warning to clients through the MistEye system, involving 472 malicious skills and related IOC.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)