Categories: The Verge

OpenClaw’s AI ‘skill’ extensions are a security nightmare

OpenClaw, the AI agent that has exploded in popularity over the past week, is raising new security concerns after researchers uncovered malware in hundreds of user-submitted “skill” add-ons on its marketplace. In a post on Monday, 1Password product VP Jason Meller says OpenClaw’s skill hub has become “an attack surface,” with the most-downloaded add-on serving as a “malware delivery vehicle.”

OpenClaw – first called Clawdbot, then Moltbot – is billed as an AI agent that “actually does things,” such as managing your calendar, checking in for flights, cleaning out your inbox, and more. It runs locally on devices, and users can interact with t …

Read the full story at The Verge.

rssfeeds-admin

Share
Published by
rssfeeds-admin

Recent Posts

The Odyssey’s Runtime Has Been Revealed and It’s One of Christopher Nolan’s Longest Films

Christopher Nolan's The Odyssey won't be three hours long... but it will be pretty dang…

18 minutes ago

The Recertified Sonos Memorial Day Sale Is Now Live, With Huge Savings on Subs, Speakers, and Soundbars

The Recertified Sonos Memorial Day Sale is now live and will run through Memorial Day,…

18 minutes ago

Star Wars: What Is the Future of the Mando-Verse After The Mandalorian and Grogu?

Warning: This article contains full spoilers for The Mandalorian and Grogu!The Mandalorian and Grogu has…

19 minutes ago

Hackers Use Fake Microsoft Teams Downloads to Deploy ValleyRAT Malware

Hackers have been caught running a deceptive campaign that uses fake Microsoft Teams download websites…

53 minutes ago

TamperedChef Malware Uses Signed Productivity Apps to Deliver Stealers and RATs

A new wave of malware disguised as everyday productivity tools has been quietly spreading across…

54 minutes ago

Fake Invitation Phishing Campaign Targets U.S. Organizations With Credential Theft

A large-scale phishing campaign is actively targeting U.S. organizations, using fake event invitations as bait…

54 minutes ago

This website uses cookies.