OpenClaw Bug Enables RCE; MoltBot Skills Exploited for Malware
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
- A critical vulnerability in the OpenClaw platform allows for one-click remote code execution (RCE) simply by coercing a user to click a malicious link.
- The flaw stems from improper handling of specially crafted URLs, which can bypass security checks and execute arbitrary code within the OpenClaw browser-like environment.
- Successful exploitation grants an attacker full control over the user's OpenClaw instance, enabling data theft, further system compromise, or surveillance.
Source: The Hacker News | Date: February 02, 2026
MoltBot Skills Exploited to Distribute Over 400 Malware Packages
- A malicious campaign exploited MoltBot "skills," which are extensions for an AI-powered conversational agent platform, to distribute over 400 unique malware packages within days.
- Threat actors leveraged the MoltBot platform's capabilities to embed and deliver various types of malicious payloads, potentially affecting users interacting with these compromised skills.
- The incident highlights the emerging security risks associated with AI-driven platforms and their extension ecosystems, akin to browser extension vulnerabilities and supply chain attacks.
Source: Security Affairs | Date: February 02, 2026
References
- OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link - The Hacker News
- MoltBot Skills exploited to distribute 400+ malware packages in days - Security Affairs