BlocktoBlockto
OpenClaw AI Plugin Marketplace Hit by Large-Scale Supply Chain Attacks, SlowMist Warns
NEWS

Photo: Illustrative

OpenClaw AI Plugin Marketplace Hit by Large-Scale Supply Chain Attacks, SlowMist Warns

The plugin ecosystem of the open-source AI agent framework OpenClaw is facing a significant security threat after hundreds of malicious plugins were discovered, according to a recent cybersecurity report.

Tristan R.
By Tristan R.

Senior Author · February 9, 2026

2 min
Key takeaways
The plugin ecosystem of the open-source AI agent framework OpenClaw is facing a significant security threat after hundreds of malicious plugins were discovered, according to a recent cybersecurity report.
Hundreds of Malicious AI Plugins Identified Blockchain security firm SlowMist revealed that attackers have been actively uploading poisoned plugins, known as “skills,” to OpenClaw’s official plugin hub, ClawHub.
The firm identified 472 AI skills containing malicious code , triggering high-severity alerts through its Web3 threat intelligence system.

The plugin ecosystem of the open-source AI agent framework OpenClaw is facing a significant security threat after hundreds of malicious plugins were discovered, according to a recent cybersecurity report.

Hundreds of Malicious AI Plugins Identified

Blockchain security firm SlowMist revealed that attackers have been actively uploading poisoned plugins, known as “skills,” to OpenClaw’s official plugin hub, ClawHub. The firm identified 472 AI skills containing malicious code, triggering high-severity alerts through its Web3 threat intelligence system. The issue is attributed to weak or absent review processes, allowing harmful plugins to be distributed to unsuspecting users.

How the Supply Chain Attack Works

The malicious skills are disguised as legitimate dependency installation packages. Once installed, they execute hidden commands that activate backdoors on user devices. These backdoors, often encoded using Base64 techniques, can harvest sensitive data such as passwords, private files, and system information.

Coordinated Infrastructure Behind the Attacks

Most of the poisoned plugins trace back to a single malicious domain and IP address linked to known exploit infrastructure. The reuse of domains, IPs, and identical attack patterns strongly suggests an organized and coordinated operation rather than isolated incidents.

Malicious domain linked to supply poisoning attacks

The infected plugins frequently use names related to cryptocurrency, financial automation, and trading tools—categories more likely to attract crypto investors and lower their security vigilance.

SlowMist advises users to carefully audit plugin documentation, avoid executing copied installation commands blindly, and be cautious of any AI skill requesting system passwords or elevated permissions.

Disclaimer

This content is for informational purposes only and does not constitute financial, investment, or legal advice. Cryptocurrency trading involves risk and may result in financial loss.

How markets are positioning

Live market reaction

🛢️WTI Crude
+3.4%
Gold
+1.8%
Bitcoin
-1.8%
$DXY
+0.6%

Disclaimer

This content is for informational purposes only and does not constitute financial, investment, or legal advice. Cryptocurrency trading involves risk and may result in financial loss.

Exclusive partner offer

Start trading
with BloFin today

Up to $500 sign-up bonus and zero-fee trading on your first 30 days.

Buy crypto now

You will be redirected to BloFin

Share article

About the author

Tristan R.
Tristan R.

8+ years covering crypto markets, macro, and geopolitics. Previously at Decrypt and CoinDesk. Focused on the intersection of digital assets and traditional finance.