Researchers uncovered more than 400 malicious skills for the OpenClaw AI agent platform published on ClawHub and GitHub between late January and early February 2026. The packages use ClickFix-style social engineering to trick users into installing Atomic Stealer (AMOS) and other info-stealing malware targeting crypto wallets, passwords, and developer credentials.

Incident overview

AttributeDetails
Campaign nameClawHavoc
Malicious skills identified400+
Primary malwareAtomic Stealer (AMOS)
Target OSmacOS (primary), Windows (secondary)
Attack methodClickFix-style fake prerequisites
DistributionClawHub marketplace, GitHub
DiscoveryKoi Security (Oren Yomtov)
VerificationVirusTotal Code Insight

What is OpenClaw and ClawHub?

OpenClaw (formerly Clawdbot and Moltbot) is a self-hosted AI agent that runs on your machine and executes real actions on your behalf: shell commands, file operations, network requests.

ClawHub is the marketplace for finding and installing third-party OpenClaw skills—extensions that add capabilities to the AI agent.

ComponentRisk level
OpenClaw agentHigh—executes code with user privileges
ClawHub marketplaceCritical—minimal vetting of uploads
Third-party skillsVariable—depends on publisher

Attack timeline

Date RangeEvent
January 27-29, 2026Initial batch of 28 malicious skills published
January 31 - February 2, 2026Second wave of 386 skills deployed
February 2, 2026VirusTotal Code Insight identifies hundreds of malicious packages
February 2, 2026Koi Security publishes full analysis

Campaign discovery

The discovery was led by Koi Security researcher Oren Yomtov and his AI assistant “Alex,” an OpenClaw bot configured for threat analysis. Suspicious of the rapidly growing volume of skills available on ClawHub (over 2,800 at the time), Alex flagged concerns about the lack of vetting in the ecosystem.

This prompted a full audit of the marketplace, revealing the highly organized ClawHavoc campaign.

Infection rate

MetricValue
Total skills audited2,857
Malicious skills identified341
Infection rate11.9%
Single campaign attribution335 skills (98%)
Campaign windowJanuary 27-29, 2026

The 11.9% malicious skill rate—nearly 1 in 8 packages—demonstrates that the week-old GitHub account requirement provides virtually no barrier to malicious actors.

The hightower6eu threat actor

One account dominated the campaign. The ClawHub user hightower6eu uploaded dozens of near-identical skills that became some of the most downloaded on the platform.

MetricValue
Skills analyzed from hightower6eu314
Malicious percentage100%
Download rankAmong most downloaded on platform
Documentation qualityExtensive (to appear legitimate)

The skills appear legitimate on the surface, with extensive documentation and real-seeming functionality, but each directs users to execute malicious commands as “prerequisites.”

Attack methodology

The malicious skills use a consistent pattern:

PhaseAction
1User discovers skill offering useful functionality
2Skill README prominently mentions “AuthTool” or similar as critical dependency
3Installation instructions direct user to download password-protected ZIP
4Alternatively, user instructed to run obfuscated shell script
5”Prerequisite” installs Atomic Stealer or Windows infostealer
6Malware runs silently, exfiltrating credentials

This follows the ClickFix attack pattern: tricking users into executing malicious commands by framing them as necessary setup steps.

Malicious skill categories

CategoryCountNotes
Crypto utilities111Solana/Phantom wallet trackers
YouTube tools57Video summarizers, downloaders
Finance/social trends51Yahoo Finance, X/Twitter trackers
Prediction market bots34Targeting Polymarket users
Auto-updaters28Fake update mechanisms
Google Workspace integrations17Productivity tool mimics

Cryptocurrency-related skills were the most common, aligning with the malware’s focus on stealing crypto wallet credentials.

Typosquatting campaign

Beyond the hightower6eu account, attackers deployed an extensive typosquatting strategy:

TargetTyposquats registered
clawhubclawhubb, cllawhub, clawhub-cli
Core ClawHub tools24+ lookalike packages

These typosquatted names catch users who mistype package names during installation.

Atomic Stealer (AMOS) payload

Analysis found 335 skills install Atomic Stealer on macOS. AMOS is a well-established macOS stealer designed to harvest:

Data typeTargeted
System passwordsYes
Application passwordsYes
Browser cookiesYes
Browser stored credentialsYes
Cryptocurrency wallet filesYes
Crypto exchange API keysYes
SSH credentialsYes
Browser extension dataYes (especially crypto wallets)

The malware runs stealthily in the background, systematically exfiltrating sensitive data.

Memory poisoning attack

Perhaps most concerning, attackers specifically targeted OpenClaw’s memory files:

Target filePurposeAttack impact
SOUL.mdAI agent personality/instructionsPermanently alter agent behavior
MEMORY.mdPersistent conversation contextInject malicious instructions

By accessing these files, attackers can execute memory poisoning attacks that permanently alter the AI’s behavior—potentially causing it to exfiltrate data, execute commands, or behave maliciously in future interactions without user awareness.

Windows payloads

Six skills delivered Windows-specific infostealers with similar credential-harvesting capabilities.

Technical indicators

IndicatorValue
C2 Server91.92.242[.]30
Primary MalwareAtomic Stealer (AMOS)
PlatformmacOS (primary), Windows (secondary)
DistributionClawHub, GitHub
Indicator patternAll skills share same C2 infrastructure

All malicious skills share the same C2 infrastructure, indicating a single coordinated campaign rather than multiple independent actors.

Detection indicators

IndicatorMeaning
Connections to 91.92.242[.]30Active C2 communication
Unexpected LaunchAgent entriesmacOS persistence
New LaunchDaemon entriesSystem-level persistence
Processes accessing browser credential storesCredential theft
Outbound data transfers post-skill installationExfiltration

Platform security failure

The problem stems from ClawHub’s permissive design:

IssueImpact
Open by defaultAnyone can upload skills
Minimal verificationOnly requires 1-week-old GitHub account
No code reviewSkills aren’t analyzed before publication
Reactive removalMalware distributed during detection gap
No sandboxingSkills execute with full user privileges

Despite being notified, ClawHub’s maintainer admitted the registry cannot be secured. Most malicious skills remain online as of publication.

Defensive tool: Clawdex

To help users protect themselves, Koi Security published a skill called Clawdex that:

FeatureFunction
Pre-installation scanningChecks skills against known malicious database
Retroactive scanningAudits already-installed skills
Real-time updatesReceives new threat intelligence
Publisher verificationFlags suspicious account patterns

While not a complete solution, Clawdex provides a layer of defense for users who continue to use ClawHub.

Separate from CVE-2026-25253

This supply chain attack is distinct from the recently patched CVE-2026-25253, a WebSocket hijacking vulnerability in OpenClaw itself that enabled one-click RCE through malicious links.

ThreatVectorStatus
CVE-2026-25253Malicious link → WebSocket hijack → RCEPatched in 2026.1.29
ClawHavoc campaignMalicious skills → Social engineering → MalwareOngoing

Users face risks from both the platform vulnerability and the malicious skill ecosystem.

Recommendations

For OpenClaw users

PriorityAction
CriticalAudit installed skills—remove anything from untrusted publishers
CriticalRemove anything from hightower6eu
CriticalNever run “prerequisite” commands that download external executables
HighAvoid anything requiring “AuthTool”
HighVerify publishers—check GitHub account age, other projects, reputation
HighRotate credentials if suspicious skills were installed

For security teams

PriorityAction
HighBlock C2 IP 91.92.242[.]30
HighMonitor for unexpected LaunchAgent/LaunchDaemon creation
HighAlert on processes accessing browser credential stores
MediumInventory AI agent deployments and their skill ecosystems
OngoingInclude AI agent marketplaces in supply chain risk assessments

For AI platform developers

PriorityAction
CriticalImplement mandatory code review for skill submissions
HighRequire verified publisher identities
HighSandbox skill execution from sensitive data
MediumAutomated malware scanning of skill packages
OngoingSecurity audits of skill ecosystem

Context

The OpenClaw ecosystem represents a new category of supply chain attack surface: AI agent skill marketplaces. As autonomous AI assistants gain popularity, their extension ecosystems inherit the same risks that have plagued browser extensions, npm packages, and VS Code extensions—with the added danger that AI agents may execute malicious code with less user oversight.

The combination of an insecurable skill registry, high-value crypto-targeting payloads, and sophisticated social engineering makes this campaign a preview of AI agent security challenges to come.

For organizations deploying AI agents, treat skill/plugin ecosystems as untrusted code and apply the same rigor used for any third-party software.

Atomic Stealer (AMOS) background

AMOS is a commodity macOS information stealer sold as malware-as-a-service:

AttributeDetails
Pricing$500-$1,000/month subscription
First observed2023
Distribution modelMaaS (Malware-as-a-Service)
Primary targetsCryptocurrency users, developers
Delivery methodsFake apps, malvertising, supply chain

The ClawHavoc campaign represents AMOS operators expanding into AI agent ecosystems—a natural evolution given the overlap between OpenClaw’s developer user base and cryptocurrency enthusiasts.