Executive Summary
In early 2026, OpenClaw, a widely adopted open-source AI assistant, became the target of a sophisticated supply chain attack. Cybercriminals infiltrated ClawHub, OpenClaw's marketplace for third-party skills, embedding 341 malicious skills among legitimate offerings. These malicious skills, often disguised as tools for crypto traders and finance professionals, were designed to steal user credentials and deploy malware upon installation. The attack exploited the trust users placed in ClawHub's ecosystem, leading to unauthorized access and data breaches. (tech.yahoo.com)
This incident underscores the escalating risks associated with AI assistants and their extensible platforms. As organizations increasingly integrate AI agents into their workflows, the potential for supply chain attacks grows, emphasizing the need for rigorous security assessments of third-party integrations and heightened vigilance against emerging threats.
Why This Matters Now
The OpenClaw supply chain attack highlights the urgent need for organizations to scrutinize third-party integrations within AI platforms. As AI assistants become more prevalent, ensuring the security of their ecosystems is critical to prevent unauthorized access and data breaches.
Attack Path Analysis
An attacker exploited a vulnerability in OpenClaw to gain initial access, escalated privileges by manipulating the AI agent's configurations, moved laterally by accessing connected services, established command and control through the compromised AI agent, exfiltrated sensitive data via the agent's integrations, and caused impact by deploying malware and disrupting operations.
Kill Chain Progression
Initial Compromise
Description
The attacker exploited a vulnerability in OpenClaw (CVE-2026-25253) by tricking the victim into visiting a malicious website, leading to remote code execution.
Related CVEs
CVE-2026-25253
CVSS 8.8A vulnerability in OpenClaw versions before 2026.1.29 allows remote code execution via token exfiltration when processing attacker-controlled web content.
Affected Products:
OpenClaw OpenClaw – < 2026.1.29
Exploit Status:
exploited in the wildCVE-2026-26322
CVSS 7.6A Server-Side Request Forgery (SSRF) vulnerability in OpenClaw's Gateway tool allows attackers to send crafted requests to internal services.
Affected Products:
OpenClaw OpenClaw – < 2026.2.6
Exploit Status:
no public exploitCVE-2026-26319
CVSS 7.5Missing authentication in Telnyx webhook integration in OpenClaw allows unauthorized access to webhook endpoints.
Affected Products:
OpenClaw OpenClaw – < 2026.2.6
Exploit Status:
no public exploitCVE-2026-28446
CVSS 9.4A remote code execution vulnerability in OpenClaw Voice allows attackers to execute arbitrary code on exposed instances.
Affected Products:
OpenClaw OpenClaw – < 2026.2.6
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Supply Chain Compromise
Obtain Capabilities: Artificial Intelligence
Hardware Additions
Unsecured Credentials: Credentials in Files
Valid Accounts
Phishing
Application Layer Protocol
Obfuscated Files or Information
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST AI Risk Management Framework (AI RMF 1.0) – Governance
Control ID: GOVERN
ISO/IEC 42001 – AI Management System
Control ID: 5.2
PCI DSS 4.0 – Secure Development Practices
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA Zero Trust Maturity Model 2.0 – Identity Management
Control ID: Identity
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
AI-enabled supply chain attacks through compromised coding assistants like Cline create massive vulnerability exposure across development workflows and repositories.
Information Technology/IT
Autonomous AI agents with system access enable lateral movement and privilege escalation, bypassing traditional zero trust segmentation and monitoring controls.
Financial Services
AI assistants accessing sensitive financial data violate HIPAA, PCI compliance requirements while creating new attack vectors for exfiltration and fraud.
Computer/Network Security
Market disruption from AI-automated vulnerability detection threatens traditional AppSec tools while creating new attack surfaces requiring enhanced threat response.
Sources
- How AI Assistants are Moving the Security Goalpostshttps://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/Verified
- OpenClaw - Private Local AI Assistant | Free & Open Sourcehttps://openclaw-ai.net/en/securityVerified
- Vulnerability Allows Hackers to Hijack OpenClaw AI Assistanthttps://www.securityweek.com/vulnerability-allows-hackers-to-hijack-openclaw-ai-assistant/Verified
- Researchers Reveal Six New OpenClaw Vulnerabilitieshttps://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/Verified
- CVE-2026-28446: The OpenClaw Voice RCE That Makes 42,000 AI Instances Remotely Exploitablehttps://dev.to/tiamatenity/cve-2026-28446-the-openclaw-voice-rce-that-makes-42000-ai-instances-remotely-exploitable-3nbmVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's initial access may have been constrained by limiting the exposure of vulnerable services to untrusted networks.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges could have been limited by enforcing strict identity-based access controls.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement would likely have been constrained by monitoring and controlling east-west traffic between workloads.
Control: Multicloud Visibility & Control
Mitigation: The attacker's command and control communications may have been detected and disrupted by providing comprehensive visibility across cloud environments.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's data exfiltration efforts would likely have been limited by enforcing strict egress policies and monitoring outbound traffic.
The attacker's ability to deploy malware and cause disruption may have been constrained by limiting the reach of compromised services.
Impact at a Glance
Affected Business Functions
- Email Systems
- Messaging Platforms
- File Management
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive emails, messages, and files due to unauthorized access.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict OpenClaw's access to sensitive systems and data.
- • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic from OpenClaw.
- • Utilize Threat Detection & Anomaly Response to identify and respond to unusual activities within OpenClaw.
- • Apply Inline IPS (Suricata) to detect and prevent exploitation attempts targeting OpenClaw.
- • Regularly update OpenClaw and its integrations to patch known vulnerabilities promptly.



