Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Openclaw AI Skills Vulnerable to Malicious Exploits, Certik Researchers Warn

CN
bitcoin.com
Follow
3 hours ago
AI summarizes in 5 seconds.

A report by cybersecurity firm Certik has revealed significant security gaps in OpenClaw, an open-source artificial intelligence agent platform, warning that its reliance on “skill scanning” is insufficient to protect users from malicious third-party extensions.

The findings, published March 16, 2026, suggest the platform’s security model depends too heavily on detection and warnings rather than robust runtime isolation, leaving users vulnerable to host-level compromises.

According to the report, Openclaw’s marketplace, Clawhub, currently uses a layered moderation flow to review “skills”—third-party applications that give the AI agent capabilities such as system automation or cryptocurrency wallet operations. This pipeline includes Virustotal for scanning known malware and the Static Moderation Engine, a tool introduced March 8, 2026, to flag suspicious code patterns. It also includes what the report called an “incoherence detector” designed to spot mismatches between a skill’s stated purpose and its actual behavior.

However, Certik researchers said static rules searching for “red flags” were circumvented using simple code rewriting. They also asserted that the AI review layer proved effective at spotting obvious intent but struggled to identify exploitable vulnerabilities hidden within otherwise plausible-looking code.

One of the most critical flaws identified by Certik is the treatment of pending scan results. Researchers found that a skill could remain active and installable on the marketplace even while Virustotal results were still pending—a process that can take hours or days. In practice, these pending skills were treated as benign, allowing them to be installed without a warning to the user.

To prove the vulnerability, Certik researchers created a proof-of-concept (PoC) skill called “test-web-searcher.” The skill appeared functional and benign but contained a hidden “vulnerability-shaped” bug that allowed for arbitrary command execution on the host machine. When invoked via Telegram, the skill successfully bypassed Openclaw’s optional sandboxing and “popped a calculator” on the researcher’s machine—a classic demonstration of full system compromise.

The report concludes that detection can never be a substitute for a true security boundary. Certik is urging Openclaw developers to run third-party skills in isolated environments by default, rather than relying on optional user configuration. Developers should also implement a model where skills must declare specific resource needs up front, similar to modern mobile operating systems.

For users, Certik offered a stark warning: A “benign” label on Clawhub is not proof of security. Until stronger isolation is the default, the platform should only be used in low-value environments away from sensitive credentials or assets.

  • What security issue did Certik find in Openclaw? Certik reported that Openclaw’s reliance on “skill scanning” fails to adequately protect users from malicious third-party extensions.
  • How does Openclaw’s moderation flow function? Openclaw uses a layered moderation flow, including tools like Virustotal and an incoherence detector to review third-party “skills.”
  • What is the critical flaw regarding pending scan results? Skills can remain active and installable while scan results are pending, posing a risk as users may unknowingly install malicious extensions.
  • What should users do to protect their data on Openclaw? Users are advised to only use Openclaw in low-value environments until stronger isolation measures are implemented by developers.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

躺赚BNB,超级AI管家
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by bitcoin.com

6 minutes ago
GSR Acquires Autonomous and Architech to Launch Integrated Crypto Capital Markets Platform
2 hours ago
Versabank Adds Foreign Exchange Functionality to Real Bank Tokenized Deposits
3 hours ago
TRON DAO Participates in Digital Assets and AML/CFT Forum Hosted by DCGG
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarbitcoin.com
6 minutes ago
GSR Acquires Autonomous and Architech to Launch Integrated Crypto Capital Markets Platform
avatar
avatarbitcoin.com
2 hours ago
Versabank Adds Foreign Exchange Functionality to Real Bank Tokenized Deposits
avatar
avatarbitcoin.com
3 hours ago
TRON DAO Participates in Digital Assets and AML/CFT Forum Hosted by DCGG
avatar
avatarbitcoin.com
4 hours ago
MicroBT Targets Large-Scale Mining Farms With New Hydro ASIC Machines
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink