Over 1,000 Malicious Skills Found in Popular AI Marketplace, Threatening Web3 Users

A significant security vulnerability has emerged in the OpenClaw marketplace, with SlowMist revealing the presence of more than 1,000 malicious skills embedded within ClawHub. The discovery, announced on February 20, highlights a growing attack vector targeting users who rely on AI tools for development and daily tasks. These malicious packages represent a critical emerging threat in the blockchain ecosystem, raising serious questions about the security measures protecting AI-powered marketplaces.

The Scope of the Threat: What These Malicious Packages Can Do

Among the 1,184 malicious skills identified, the capabilities span a wide range of destructive functions. These packages can extract sensitive SSH keys from developer machines, encrypt cryptocurrency wallets to render them inaccessible, harvest browser-stored passwords, and establish reverse shell connections that give attackers remote control over compromised systems. The sophistication of these threats demonstrates that attackers are not merely defacing systems but are crafting carefully designed tools to steal valuable assets and maintain persistent access.

What makes this discovery particularly alarming is the volume and distribution success. A single threat actor managed to upload 677 of these malicious packages to the platform. The most dangerous skill among them contained nine distinct vulnerabilities and had been downloaded thousands of times, potentially compromising a large user base before detection.

One Attacker’s Campaign Raises Questions About Marketplace Security

The concentrated effort from a single attacker uploading nearly 600 malicious packages exposes fundamental gaps in OpenClaw’s vetting process. SlowMist founder Yu Xian emphasized that the landscape of AI-assisted development has fundamentally changed the security calculus: “text has evolved into commands,” he warned, urging developers to execute AI-generated code only within isolated, sandboxed environments.

This advice stems from a broader realization in the Web3 security community. The incident underscores how user-generated or AI-suggested content can carry hidden dangers that existing security frameworks often fail to catch.

Web3 Security Goes Beyond Smart Contracts

Yu Xian’s analysis extends beyond the immediate marketplace threat, highlighting a critical blindspot in Web3’s security approach. While the community has historically focused on contract audits and on-chain vulnerabilities, this incident reveals that the root causes of security failures often originate from tools, dependencies, and supply chain compromises rather than smart contract code itself.

Recent evidence supports this expanded threat model. Moonwell, a DeFi protocol, suffered a theft of $1.78 million, attributed to defective code from a development tool marked as “Co-Authored-By: Claude Opus 4.6.” This real-world impact demonstrates that malicious code at the development layer can be just as devastating as contract vulnerabilities, if not more so, because it operates outside the typical audit and verification processes.

The convergence of these incidents signals a maturing threat landscape where attackers are systematically targeting the infrastructure surrounding blockchain applications rather than applications themselves.

WELL1.51%
DEFI4.35%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)