A ClawJacked attack is a high-severity vulnerability targeting the OpenClaw AI agent platform that allows malicious websites to hijack locally running AI agents via localhost WebSocket connections. 1) The attack exploits weak authentication to gain full control of the agent without user interaction or malware installation, effectively turning a trusted local AI assistant into a remote attack vector.
The ClawJacked attack exploits OpenClaw's local gateway design through a four-step sequence:
This attack leverages the confused deputy problem, where the trusted local agent misuses its elevated privileges on behalf of a remote attacker. 5)
The primary vector requires only visiting a malicious website (via phishing, ads, or social engineering) while OpenClaw runs locally. No clicks, downloads, or additional interaction is needed. 6)
Related risks include malicious ClawHub skills: researchers identified 71 malicious skills that deploy infostealers and crypto-miners, propagating via compromised agents. 7)
Oasis Security published a proof-of-concept demonstrating full takeover from a browser, including password guessing, device registration, agent interaction, and configuration dumping, all performed silently without user awareness. 8)
In the wild, infostealers such as Atomic Stealer have been observed distributing through malicious ClawHub skills, with tactics aligning with FIN7 and APT37 threat actor techniques for supply-chain and browser-based attacks. 9)