OpenClaw: ClawHub Vulnerability Lets Attackers Manipulate Rankings to Reach #1

OpenClaw: ClawHub Vulnerability Lets Attackers Manipulate Rankings to Reach #1

Critical Flaw in OpenClaw’s ClawHub Marketplace Exposed Supply Chain Attack Risk

Security researchers at Silverfort uncovered a severe vulnerability in OpenClaw’s ClawHub skills marketplace, enabling attackers to manipulate download rankings and push a malicious skill to the top of its category. The flaw, discovered in March 2026, allowed adversaries to artificially inflate a package’s popularity, tricking users and autonomous AI agents into installing it under the guise of legitimacy.

How the Attack Worked

ClawHub, OpenClaw’s public registry for agent-extending skills (e.g., email, calendar, or web search integrations), relies on download counts as a key trust signal. However, Silverfort found that a publicly exposed RPC endpoint intended for internal use lacked authentication, rate limiting, or permission checks. By exploiting this, attackers could arbitrarily boost a skill’s download count with automated requests, bypassing safeguards.

To demonstrate the risk, researchers created a malicious "Outlook Graph Integration" skill, embedding a low-impact data-exfiltration payload. After flooding the system with fake downloads, the package surged to the #1 spot in its category within days. Real users and OpenClaw agents often running with high privileges installed it 3,900 times across 50+ cities, including within public companies, unwittingly leaking basic identity data (usernames, domain names) to a controlled server.

Automated Trust Exploitation

The attack’s danger was amplified by OpenClaw agents’ autonomous decision-making. When instructed to find the "best" tool for tasks like email management, agents consulted ClawHub’s rankings, favoring the manipulated skill due to its inflated download count. This created a self-reinforcing loop, where AI-driven recommendations further propagated the malicious package.

Root Cause & Fix

The vulnerability stemmed from a misconfigured backend function in ClawHub’s Convex-based infrastructure. A helper function meant for internal use was accidentally exposed as a public mutation, violating security best practices. Silverfort reported the issue on March 16, 2026, and OpenClaw deployed a fix within 24 hours, closing the exploit path.

Broader Implications

The incident highlights risks in reputation-based trust systems, where manipulated metrics can drive mass adoption of malicious software. It also underscores the need for strict security boundaries in RPC-centric backends, particularly in fast-evolving projects prioritizing speed over structured reviews.

To mitigate future risks, Silverfort released ClawNet, an open-source security plugin that scans skills for suspicious patterns before installation, acting as a runtime guardrail for OpenClaw agents. The vulnerability has since been patched, but the case serves as a cautionary example of how supply chain attacks can exploit trust signals in AI ecosystems.

Source: https://cyberpress.org/clawhub-vulnerability/

OpenClaw cybersecurity rating report: https://www.rankiteo.com/company/openclaw

"id": "OPE1774434339",
"linkid": "openclaw",
"type": "Vulnerability",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': '3,900+ installations across 50+ '
                                              'cities, including public '
                                              'companies',
                        'industry': 'AI/Agent Software',
                        'name': 'OpenClaw',
                        'type': 'Company'}],
 'attack_vector': 'Exploiting misconfigured RPC endpoint',
 'data_breach': {'data_exfiltration': True,
                 'number_of_records_exposed': '3,900+ installations',
                 'personally_identifiable_information': True,
                 'sensitivity_of_data': 'Low to medium',
                 'type_of_data_compromised': 'Personally identifiable '
                                             'information (usernames, domain '
                                             'names)'},
 'date_detected': '2026-03',
 'date_resolved': '2026-03-17',
 'description': 'Security researchers at Silverfort uncovered a severe '
                'vulnerability in OpenClaw’s ClawHub skills marketplace, '
                'enabling attackers to manipulate download rankings and push a '
                'malicious skill to the top of its category. The flaw allowed '
                'adversaries to artificially inflate a package’s popularity, '
                'tricking users and autonomous AI agents into installing it '
                'under the guise of legitimacy.',
 'impact': {'brand_reputation_impact': 'Potential erosion of trust in '
                                       'ClawHub’s ranking system',
            'data_compromised': 'Basic identity data (usernames, domain names)',
            'identity_theft_risk': 'Low (basic identity data exposed)',
            'operational_impact': 'Unauthorized installation of malicious '
                                  'skills by AI agents and users',
            'systems_affected': 'OpenClaw agents, ClawHub marketplace'},
 'investigation_status': 'Resolved',
 'lessons_learned': 'Risks in reputation-based trust systems, need for strict '
                    'security boundaries in RPC-centric backends, and the '
                    'importance of runtime guardrails for AI ecosystems.',
 'motivation': 'Demonstration of supply chain attack risk',
 'post_incident_analysis': {'corrective_actions': 'Closed the exposed RPC '
                                                  'endpoint, implemented '
                                                  'stricter security '
                                                  'boundaries, and released '
                                                  'ClawNet for runtime '
                                                  'scanning.',
                            'root_causes': 'Misconfigured backend function in '
                                           'ClawHub’s Convex-based '
                                           'infrastructure, exposed as a '
                                           'public mutation without proper '
                                           'safeguards.'},
 'recommendations': 'Implement ClawNet or similar security plugins to scan '
                    'skills for suspicious patterns before installation. '
                    'Enforce structured security reviews in fast-evolving '
                    'projects.',
 'references': [{'source': 'Silverfort'}],
 'response': {'containment_measures': 'Patch deployed within 24 hours of '
                                      'disclosure',
              'remediation_measures': 'Closed the exposed RPC endpoint, '
                                      'implemented stricter security '
                                      'boundaries',
              'third_party_assistance': 'Silverfort (researchers)'},
 'threat_actor': 'Silverfort (researchers, for demonstration)',
 'title': 'Critical Flaw in OpenClaw’s ClawHub Marketplace Exposed Supply '
          'Chain Attack Risk',
 'type': 'Supply Chain Attack',
 'vulnerability_exploited': 'Publicly exposed RPC endpoint lacking '
                            'authentication, rate limiting, or permission '
                            'checks'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.