Cybersecurity is living a moment of transition. Years ago, the value most coveted by digital robbers were passwords and bank data; today, according to recent research, attackers begin to look at something much more intimate to users: the configuration and "personalities" of IA assistants. A report by the firm Hudson Rock describes a real case in which an information thief managed to extract key files from OpenClaw, the popular open agent many are using to delegate tasks and automate workflows.
The investigators who reported the incident consider that the malicious program has similarities with known variants of the infostealer Vidar, a family of information robbers in circulation since the end of 2018. However, the relevant thing is not so much the malware label as the technique: instead of a module specifically designed for OpenClaw, the attacker used a generic "file drag" routine that looks for extensions and folder names that are likely to contain secrets.

Among the stolen files are files that are essential for an IA agent: the configuration file that saves the OpenClaw gateway token, a file with cryptographic keys used to match and sign communications, and documents that define the behavior and ethical rules of the agent itself. In other words, not only were credentials taken: pieces were extracted that allow understanding and potentially supplanting the operational identity of the assistant.
Gravity is clear: with a gateway token and access to the configuration, an attacker could try to communicate with a local OpenClaw instance exposed, make authenticated requests to the gateway or, in more complex scenarios, act on behalf of the agent against services to which the latter has permits. Files with keys and behavior templates also offer material with which to build more targeted attacks or reproduce the "personality" of the assistant.
The security community is already warning that as IA agents integrate into professional processes, malware developers will adapt their tools to expose, decipher and take advantage of these new goals, as they did in their day with browsers or messaging customers. The finding illustrates how wide and unsophisticated routines can, by chance or by design, give with highly sensitive information.
In parallel to this alert, more subtle campaigns have been detected that target the ecosystem of skills and OpenClaw supplements. Malicious groups are publishing skills that are apparently harmless but actually redirect to external resources where the harmful code is housed, a technique designed to evade analysis systems like VirusTotal. Independent researchers have documented how these skills work as lures and lead the user to cloned sites or resources hosted outside the review platform.
Other practical problems have come to light: complementary platforms such as agent forums are showing privacy failures. In one case, researchers found that the accounts of agents created in a forum-type site could never be deleted, leaving persistent data without owner control. In addition, large-scale scans have identified tens or hundreds of thousands of OpenClaw instances accessible from the Internet, opening the door to remote execution vulnerabilities that would allow an attacker to run code on systems with sensitive permissions.
The reaction of the community and the OpenClaw maintainers has been rapid: measures have been announced to improve the detection of malicious skills and to facilitate configuration audits, and collaboration has been initiated with analysis services such as VirusTotal to review contributions and reduce risks. Recommendations and tools to audit the gateway and mitigate exposures have also been published. You can read more about these initiatives on the JFrog blog and the OpenClaw trust portal.
The explosive growth of OpenClaw - a project that has reached a large user base in a short time - adds urgency to these improvements. When a software package becomes massive, its attack surface multiplies: malicious actors look for entry points where there are higher density of targets and permissions. At the same time, movements within the industry, such as the intention to integrate the project into a foundation supported by relevant actors, change the map of responsibilities and governance.
What lessons does all this leave? First, that the settings and keys of IA agents should be treated with the same zeal as passwords: stored safely, limiting their exposure and auditioning access. Second, that the communities and records of skills need robust review processes and active detection of cloned domains or external resources that can serve as a vector. And third, that managers should reduce the public exposure of instances, implement strong authentication policies and monitor access to sensitive resources from automated agents.

If you want to deepen the sources that document these findings and technical responses, here are reference material: Hudson Rock's analysis of infection, specialized media coverage, OpenClaw's proposed recommendations and audits, malicious skills research and reports of exposed instances that have published independent teams.
The arrival of IA assistants capable of running tasks on our behalf brings enormous advantages, but also new risk vectors. Digital prevention and hygiene - updates, configuration reviews, access control and surveillance over the extension ecosystem - will be key to not becoming an open door for attackers.
Recommended sources and readings: Hudson Rock report on the incident ( infostealers.com), analysis of scanning techniques in ClawHub ( OpenSourceMalware), the warnings on exposed instances and CERs ( SecurityScorecard), the privacy notes in agent forums ( OX Security), the OpenClaw technical guide and audit mechanisms ( docs.openclaw.ai), and the call for prudence and good practice published by JFrog ( jfrog.com). For context on the project's popularity and future, the official repository in GitHub and public communication of its integration with industry actors provide more details ( GitHub, Sam Altman's announcement).
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...