Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Study: Critical Exploit in Openclaw Allows Full Administrative Hijacking

CN
bitcoin.com
Follow
1 hour ago
AI summarizes in 5 seconds.

A March 31 study by Web3 security firm Certik has pulled back the curtain on a “systemic collapse” of security boundaries within Openclaw, an open-source artificial intelligence (AI) platform. Despite its rapid ascent to more than 300,000 Github stars, the framework has accumulated more than 100 CVEs and 280 security advisories in just four months, creating what researchers call an “unbounded” attack surface.

The report highlights a fundamental architectural flaw: Openclaw was originally designed for “trusted local environments.” However, as the platform’s popularity exploded, users began deploying it on internet-facing servers—a transition the software was never equipped to handle.

According to the study report, researchers identified several high-risk failure points that jeopardize user data, including the critical vulnerability, CVE-2026-25253, which allows attackers to seize full administrative control. By tricking a user into clicking a single malicious link, hackers can steal authentication tokens and hijack the AI agent.

Meanwhile, global scans revealed more than 135,000 internet-exposed Openclaw instances across 82 countries. Many of these had authentication disabled by default, leaking API keys, chat histories and sensitive credentials in plaintext. The report also asserts that the platform’s repository for user-shared “skills” has been infiltrated by malware and hundreds of these extensions were found to be bundling infostealers designed to siphon saved passwords and cryptocurrency wallets.

Furthermore, attackers are now hiding malicious instructions within emails and webpages. When the AI agent processes these documents, it can be forced to exfiltrate files or execute unauthorized commands without the user’s knowledge.

“Openclaw has become a case study in what happens when large language models stop being isolated chat systems and start acting inside real environments,” said a lead auditor from Penligent. “It aggregates classic software defects into a runtime with high delegated authority, making the blast radius of any single bug massive.”

In response to these findings, experts are urging a “security-first” approach for both developers and end users. For developers, the study recommends establishing formal threat models from day one, enforcing strict sandbox isolation and ensuring that any AI-spawned subprocess inherits only low-privilege, immutable permissions.

For enterprise users, security teams are urged to use endpoint detection and response (EDR) tools to locate unauthorized Openclaw installations within corporate networks. On the other hand, individual users are encouraged to run the tool exclusively in a sandboxed environment with no access to production data. Most importantly, users must update to version 2026.1.29 or later to patch known remote code execution (RCE) flaws.

While Openclaw’s developers recently partnered with Virustotal to scan uploaded skills, Certik researchers warn this is “no silver bullet.” Until the platform reaches a more stable security phase, the industry consensus is to treat the software as inherently untrusted.

  • What is Openclaw? Openclaw is an open‑source AI framework that quickly grew to 300,000+ GitHub stars.
  • Why is it risky? It was built for trusted local use but is now widely deployed online, exposing major flaws.
  • What threats exist? Critical CVEs, malware‑infected extensions, and 135,000+ exposed instances across 82 countries.
  • How can users stay safe? Run only in sandboxed environments and update to version 2026.1.29 or later.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

OKX 活期简单赚币,让你的链上黄金生生不息
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by bitcoin.com

36 minutes ago
Interactive Brokers Launches Crypto Trading for Individual Investors in Europe
2 hours ago
Iran Targets Google, Microsoft, Tesla, and More Tech Companies in Retaliation Threat
3 hours ago
Bitcoin ETFs Rebound With $69 Million Inflow as Ether Ends Losing Streak
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarbitcoin.com
36 minutes ago
Interactive Brokers Launches Crypto Trading for Individual Investors in Europe
avatar
avatarbitcoin.com
2 hours ago
Iran Targets Google, Microsoft, Tesla, and More Tech Companies in Retaliation Threat
avatar
avatarbitcoin.com
3 hours ago
Bitcoin ETFs Rebound With $69 Million Inflow as Ether Ends Losing Streak
avatar
avatarbitcoin.com
4 hours ago
Keyrock Secures $1.1B Valuation After Ripple Support and SC Ventures Funding Drive Expansion
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink