ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill
Cybersecurity NewsArchived Mar 25, 2026✓ Full text saved
Security research team has uncovered a critical vulnerability in ClawHub, the public skills registry for the OpenClaw agentic ecosystem. This flaw allowed attackers to artificially inflate the download counts of malicious skills, thereby bypassing security checks and manipulating search rankings. By pushing a compromised skill to the top, threat actors could orchestrate massive supply-chain attacks […] The post ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill appear
Full text archived locally
✦ AI Summary· Claude Sonnet
Home Cyber Security News ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill
Security research team has uncovered a critical vulnerability in ClawHub, the public skills registry for the OpenClaw agentic ecosystem.
This flaw allowed attackers to artificially inflate the download counts of malicious skills, thereby bypassing security checks and manipulating search rankings.
By pushing a compromised skill to the top, threat actors could orchestrate massive supply-chain attacks against both human users and autonomous AI agents.
ClawHub functions similarly to npm for OpenClaw agents, enabling developers to publish integrations for tasks such as calendar management and web searching.
Because users and AI models heavily weight download counts as a metric of trust, an inflated download counter can provide the social proof needed to trick targets into installing malicious code.
Creating a skill(source : silverfort)
Technical Exploitation
The root cause of this vulnerability stems from the platform’s backend implementation using the convex framework.
Convex operates on a typed Remote Procedure Call (RPC) model where backend functions act as independent endpoints. Developers must explicitly define these backend functions as either internal or public.
During their analysis, Silverfort researchers discovered that the downloads: increment function was mistakenly exposed as a public mutation rather than an internal private function.
Gaming the ranking system to achieve the #1 spot in our skills category(source : silverfort)
This critical configuration error bypassed all intended validation layers. An attacker could send an unauthenticated curl request targeting the exposed deployment URL with any valid skill identifier.
Without authentication, rate limiting, or deduplication mechanisms in place, threat actors could continuously trigger the endpoint, causing the download metric for a given skill to increase indefinitely.
Attack Chain and Impact
To demonstrate the severity of this flaw, Silverfort crafted a proof-of-concept supply chain attack.
They published a seemingly legitimate Outlook Graph Integration skill containing a hidden data-exfiltration payload disguised as a telemetry function.
Requesting more than 20,000 downloads for the malicious skill(source : silverfort)
By exploiting the exposed RPC endpoint, the researchers flooded the backend database with requests, instantly pushing their malicious skill to the top of the ClawHub search results.
The inflated ranking successfully deceived both human users and automated OpenClaw agents searching for calendar tools.
Within six days, the compromised skill achieved 3,900 executions across fifty global cities, infiltrating several public companies.
The payload quietly exfiltrated usernames and domain names, highlighting how easily real threat actors could harvest environment variables, memory tokens, or local files within the agent’s execution context.
Silverfort responsibly disclosed the vulnerability to the OpenClaw team on March 16, 2026.
Lead developer Peter Steinberger and the platform’s security team resolved the issue and deployed a production fix within 24 hours.
This incident highlights the hidden security risks associated with rapid development, or “vibe-coding,” and the dangers of AI agents making autonomous installation decisions based solely on social proof.
To mitigate future supply chain threats, Silverfort has released ClawNet, an open-source security plugin for OpenClaw.
ClawNet operates at the runtime level to intercept installation attempts, using the agent’s language model to scan skill content for malicious patterns before execution is allowed.
RELATED ARTICLESMORE FROM AUTHOR
Cyber Security News
Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths
Cyber Security News
FCC Banned Foreign-made Consumer Routers Over Security Risks
Cyber Security News
LiteLLM PyPI Package With 95 Million Downloads Compromised by TeamPCP Hackers
Top 10
Essential E-Signature Solutions for Cybersecurity in 2026
January 31, 2026
Top 10 Best Data Removal Services In 2026
January 29, 2026
Best VPN Services of 2026: Fast, Secure & Affordable
January 26, 2026
Top 10 Best Data Security Companies in 2026
January 23, 2026
Top 15 Best Ethical Hacking Tools – 2026
January 15, 2026