Skip to main content
Back to BlogThreat Intelligence
OpenClaw/Clawdbot: Why SOCs Must Block This AI Agent Immediately

OpenClaw/Clawdbot: Why SOCs Must Block This AI Agent Immediately

Over 1,800 exposed control panels, supply chain attacks, and a VS Code trojan deploying ScreenConnect RAT. Here's the evidence-based case for blocking Clawdbot and the actionable playbook your SOC needs.

February 1, 202615 min readBy Adil Karam

The AI agent revolution has its first major security catastrophe. If your organization hasn't already taken action, you're likely exposed.

OpenClaw (formerly Clawdbot and Moltbot) is an open-source AI agent platform that promised to revolutionize personal productivity. Instead, it has become a case study in how autonomous AI systems can become catastrophic security liabilities. In late January 2026, security researchers uncovered a cascade of critical vulnerabilities, supply chain attacks, and active exploitation that should alarm every security leader.

Bottom Line: If any employee in your organization has installed Clawdbot/Moltbot/OpenClaw, you have an immediate, high-severity risk that requires containment. This briefing provides the evidence and the playbook.


What Is OpenClaw (Clawdbot/Moltbot)?

Clawdbot launched as an ambitious open-source project designed to be a "personal AI agent," an autonomous assistant that could:

  • Read and send emails, manage calendars
  • Execute shell commands on the host system
  • Integrate with Slack, Telegram, Discord, and WhatsApp
  • Browse the web and interact with files
  • Control browsers via automation
  • The platform connects large language models (Anthropic Claude, OpenAI GPT, Google Gemini) to these capabilities, creating what the developers called a "local AI that actually does things."

    The problem? Broad system access + internet connectivity + misconfigured deployments = security nightmare.

    Following a trademark dispute with Anthropic (makers of Claude), the project was hastily rebranded from "Clawdbot" to "Moltbot" and then "OpenClaw." This created brand confusion that attackers immediately exploited.


    The Breach Timeline: January 2026

    Week 1: Exposed Control Panels Discovered

    Security researcher Jamieson O'Reilly began investigating Clawdbot deployments and discovered something alarming: hundreds of Clawdbot Control panels exposed directly to the internet.

    Using Shodan, researchers identified the scope:

    DateExposed Instances
    January 20, 2026900+
    January 22, 20261,673
    January 24, 20261,842
    January 28, 20264,000+

    The critical finding: 92% of exposed instances had authentication completely disabled.

    These weren't just dashboards. The exposed control panels provided:

  • Full conversation histories from private chats
  • API keys for OpenAI, Anthropic, and Google AI services
  • OAuth tokens for Slack, Discord, and email integrations
  • Credential files for messaging platforms (Signal, Telegram, WhatsApp)
  • Unauthenticated shell access on many instances
  • Week 2: Supply Chain Attack Exploits Rebrand Chaos

    When Anthropic's legal team forced the "Clawdbot" → "Moltbot" rebrand, the project's creator briefly released the original GitHub organization name and Twitter handle. Within 10 seconds, attackers seized both.

    The impersonation campaign included:

  • Typosquat domains: moltbot[.]you, clawbot[.]ai, clawdbot[.]you
  • Cloned GitHub repositories with clean code (ready for malicious updates)
  • Fake cryptocurrency tokens: $CLAWD on Solana reached $16M market cap before crashing
  • This wasn't opportunistic. It was coordinated infrastructure for supply chain attacks.

    Week 3: Malicious VS Code Extension Deploys RAT

    Before the legitimate Clawdbot team could publish an official VS Code extension, attackers published a fake "ClawdBot Agent" extension to the VS Code Marketplace.

    The payload: Upon installation, the extension:

  • Activated automatically when VS Code launched
  • Fetched configuration from an attacker-controlled domain
  • Downloaded and executed a fake Code.exe binary
  • Installed ScreenConnect RAT, providing full remote desktop control
  • Microsoft removed the extension after researcher reports, but the damage window was significant.

    Ongoing: Prompt Injection Attacks

    The most insidious attack vector requires no vulnerability at all. It exploits Clawdbot's intended functionality.

    Attack flow:

  • Attacker sends a crafted email to the victim
  • Victim's Clawdbot instance reads the email (as designed)
  • Hidden instructions in the email trick Clawdbot into exfiltrating data
  • Sensitive files, API keys, or emails are sent to attacker-controlled addresses
  • Documented attacks include:

  • Wiped email inboxes via automated deletion commands
  • Stolen Netflix and Spotify accounts via session token exfiltration
  • Corporate document theft from connected cloud storage

  • The Evidence: CVEs and Technical Details

    Known CVEs

    CVEVulnerabilityCVSSImpact
    CVE-2025-49596Unauthenticated AccessCriticalFull administrative control
    CVE-2025-6514Command InjectionCriticalRemote code execution
    CVE-2025-52882Arbitrary File AccessHighData theft, persistence

    Default Port and Service

    ServicePortProtocol
    Clawdbot Gateway (Control UI)18789HTTP/WebSocket

    Shodan Detection Queries

    http.title:"Clawdbot Control"

    http.title:"Clawdbot Control" port:18789

    port:18789 http

    Known Malicious Domains (Defanged)

    DomainType
    moltbot[.]youTyposquat/Phishing
    clawbot[.]aiTyposquat/Phishing
    clawdbot[.]youTyposquat/Phishing
    github[.]com/gstarwd/clawbotMalicious Clone

    Malicious VS Code Extension

    Extension NamePublisherPayload
    ClawdBot Agent(Removed)ScreenConnect RAT

    Why SOCs Must Block Clawdbot: The Business Case

    1. Shadow AI Is Already in Your Environment

    Clawdbot gained viral popularity among developers and knowledge workers. Unlike traditional shadow IT, it doesn't require admin privileges. It runs in userspace with the user's full permissions.

    If your employees discovered ChatGPT, they've probably discovered Clawdbot.

    2. Credential Exposure Is Near-Certain

    Clawdbot stores sensitive credentials in plaintext on the local filesystem:

  • API keys for AI services
  • OAuth tokens for business applications
  • Messaging platform credentials
  • Even properly configured instances are honey pots for commodity malware that targets local files.

    3. It's a Persistent Backdoor

    A compromised Clawdbot instance provides:

  • Command execution on the host
  • Lateral movement via messaging integrations
  • Data exfiltration via AI-mediated channels
  • Persistence as a legitimate application
  • 4. Regulatory and Liability Risk

    If a breach traces back to an unmanaged AI agent:

  • GDPR/CCPA violations for uncontrolled data processing
  • SEC disclosure obligations for material incidents
  • Director liability under emerging AI governance standards

  • SOC Action Playbook

    Immediate Actions (First 24 Hours)

    1. Network-Level Blocking

    Block inbound AND outbound traffic on port 18789 at the perimeter firewall:

    iptables -A INPUT -p tcp --dport 18789 -j DROP

    iptables -A OUTPUT -p tcp --dport 18789 -j DROP

    2. DNS Sinkhole Malicious Domains

    Add to your DNS blocklist:

  • moltbot.you
  • clawbot.ai
  • clawdbot.you
  • Any domain matching *clawdbot* or *moltbot*
  • 3. EDR/Endpoint Hunt

    Search for:

  • Process names: clawdbot, moltbot, openclaw
  • File paths containing: clawdbot, moltbot, .clawdbot
  • Network connections to port 18789
  • VS Code extensions with "clawdbot" or "clawbot" in the name
  • 4. VS Code Extension Audit

    bash
    find /Users -name "extensions.json" -path "*/.vscode/*" 2>/dev/null | xargs grep -l -i "clawdbot\|clawbot"

    Short-Term Actions (First Week)

    5. Email Gateway Rules

    Implement content inspection rules to detect prompt injection patterns:

  • Emails containing ignore previous instructions
  • Hidden text or white-on-white styling
  • Embedded base64 payloads in email bodies
  • 6. VPN/Remote Access Audit

    Check for any Clawdbot instances exposed through VPN tunnels or remote access solutions.

    7. Cloud Service Audit

    Review connected applications in:

  • Slack workspace integrations
  • Microsoft Teams apps
  • Google Workspace connected apps
  • Discord bots
  • Ongoing Monitoring

    8. Shodan/Censys Monitoring

    Set alerts for your external IP ranges:

    http.title:"Clawdbot Control" ip:YOUR_RANGE

    9. Threat Intelligence Feeds

    Subscribe to feeds covering:

  • New Clawdbot/Moltbot CVEs
  • Typosquat domain registrations
  • VS Code extension takedowns

  • Detection Rules

    Sigma Rule (Network)

    yaml
    title: Clawdbot Control Panel Access

    status: experimental

    logsource:

    category: proxy

    detection:

    selection:

    c-uri|contains: 'Clawdbot Control'

    selection_port:

    dst_port: 18789

    condition: selection or selection_port

    falsepositives:

    - Legitimate developer testing (should be rare)

    level: high

    Yara Rule (File)

    yara
    rule Clawdbot_Config {

    meta:

    description = "Detects Clawdbot configuration files"

    severity = "high"

    strings:

    $s1 = "clawdbot" ascii nocase

    $s2 = "moltbot" ascii nocase

    $s3 = "anthropic_api_key" ascii

    $s4 = "openai_api_key" ascii

    condition:

    any of ($s1, $s2) and any of ($s3, $s4)

    }


    The Board Brief

    What to tell leadership:

    "We have identified a critical shadow AI risk from an application called Clawdbot/Moltbot/OpenClaw. Security researchers discovered over 1,800 exposed instances globally, with 92% lacking authentication. Active exploitation includes credential theft, supply chain attacks, and malware distribution. We have implemented blocking controls across our network and are conducting an enterprise-wide hunt. This incident reinforces the need for formal AI governance policies to prevent employees from deploying unapproved AI agents with broad system access."

    Key metrics to report:

  • Number of endpoints scanned
  • Instances discovered (if any)
  • Exposed credentials requiring rotation
  • Timeline to complete remediation

  • Lessons Learned: The Larger AI Agent Risk

    Clawdbot is the canary in the coal mine. As AI agents become more capable and more popular, we should expect:

  • More shadow AI deployments as employees seek productivity gains
  • More agentic attack surfaces as AI systems gain execution capabilities
  • More supply chain attacks targeting popular AI tooling
  • More prompt injection vectors as AI processes untrusted content
  • The answer isn't to ban AI. The answer is to bring it under governance.


    Conclusion

    The Clawdbot incident is a wake-up call for every security organization. AI agents with broad system access, deployed without oversight, connected to the internet with default credentials: this is a recipe for disaster that played out exactly as security professionals would predict.

    Your action items:

  • ✅ Block port 18789 and malicious domains immediately
  • ✅ Hunt for Clawdbot installations across your endpoint fleet
  • ✅ Audit VS Code extensions for malicious packages
  • ✅ Brief leadership on the shadow AI risk
  • ✅ Establish AI agent governance policies for the future
  • The broader question: What other AI agents are your employees running? Do you have visibility? Do you have controls?


    How I Help

    This incident highlights why AI governance is not optional. It is urgent. If you are concerned about shadow AI, agentic security, or AI-related compliance, I bring 20+ years of security leadership to help organizations get ahead of these risks.

    Relevant services:

  • AI Governance Programs: Implement controls before the next Clawdbot
  • Shadow AI Assessments: Discover what is already running in your environment
  • Board Advisory: Translate AI risk into boardroom language
  • Security Architecture Reviews: Harden your environment against agentic threats
  • Schedule a discovery call to discuss your organization's AI security posture.


    Sources and References

  • Bitdefender: Clawdbot Security Analysis
  • Malwarebytes: Moltbot Supply Chain Attack
  • The Register: Exposed Clawdbot Control Panels
  • Aikido.dev: Fake VS Code Extension Report
  • SOC Prime: Clawdbot Detection Rules
  • NIST AI Risk Management Framework
  • #AI Security#Threat Intelligence#SOC#Malware#Supply Chain#Shadow AI#AI Governance
    PDFShare:

    Adil Karam

    Security & AI Governance Advisor

    Helping organizations navigate security leadership and AI governance challenges.

    Ready to Put These Insights Into Action?

    Whether you need AI governance, security leadership, or compliance guidance—let's discuss how to apply these strategies to your organization.