BlockBeats news, on February 9, SlowMist issued a security alert. Recently, the open-source artificial intelligence agent project OpenClaw has unexpectedly become popular, and its official plugin center ClawHub is gradually becoming a new target for supply chain poisoning attacks, posing potential security risks to developers and users. Monitoring has identified 341 malicious skills, which are often disguised as encrypted assets, security checks, or automation tools.
Attackers use the SKILL.md file as an entry point for executing instructions, hiding malicious commands through Base64 encoding, and employ a two-stage loading mechanism to evade detection. In the first stage, curl is used to fetch the payload, and in the second stage, a sample named dyrtvwjfveyxjf23 is deployed, deceiving users into entering their system password and stealing local documents and system information. Users are advised to review any commands that need to be copied and executed, be cautious of prompts requesting system privileges, and prioritize obtaining tools through official channels.
