Resources
Blog
Blog
Blog

The “Agentic Trojan Horse” Debate: How OpenClaw’s Convenience Model Opens Real-World Attack Paths

Author:
Yonatan Keller
,
Analyst Team Lead
Published on
February 17, 2026
Blog

In the rapidly evolving landscape of 2026, OpenClaw has become the poster child for the "convenience-first" AI revolution. It isn’t a corporate suite or a heavy enterprise tool; it’s a nimble, open-source personal digital assistant designed to sit on your local machine and "just do things." It reads your emails, manages your files, and executes terminal commands with a level of autonomy that makes Siri look like a calculator.

But as OpenClaw's GitHub stars skyrocketed, the cybersecurity industry hit the panic button. Some famously branded the tool a "security nightmare" (Cisco), others labeled it an "unacceptable cybersecurity liability" (Gartner) or an “agentic Trojan horse” (SecurityScorecard). The question is no longer about what OpenClaw can do, but whether these alarmist warnings are justified—or if we're just witnessing the growing pains of a revolutionary technology.

An Architecture Built for Speed, Not Safety

The anxiety surrounding OpenClaw isn't merely alarmist posturing or empty speculation - it is a normal reaction to what researchers call a Toxic Triad of structural failures.

  • Viral, Ungoverned Adoption: OpenClaw’s growth has been explosive, shattering records by reaching the 100,000-star milestone in seven days - 18 times faster than it took Kubernetes to reach the same level of community traction. This viral adoption created a massive, global attack surface almost overnight. While it is a personal assistant rather than a corporate-vetted suite, it might be installed on employee endpoints and quietly turn a personal productivity tool into a potential gateway for enterprise-wide compromise.
  • Over-Privileged by Default: by design, OpenClaw is engineered for deep integrations with a user’s most sensitive digital layers - from their inbox and messaging apps to the local file system and core system tools. This isn't just an optional feature; since it is not just a chatbot but a tool aimed at performing actual tasks, its core functionality mandates that it operates with the exact same level of permissions as the human user. Effectively, the agent inherits your digital identity.
  • Low Security Standards: From storing credentials in cleartext to an API gateway that binds to 0.0.0.0:18789 (exposing it to the entire internet), the architecture is essentially an open invitation to hackers.

To make things worse, we’ve already moved past the theoretical stage. Attackers are actively scanning for these exposed gateways and uploading "poisoned skills" to the ClawHub marketplace. One campaign, dubbed ClawHavoc, even flooded the marketplace with over 300 malicious skills which were disguised as legitimate finance tools but aimed at exfiltrating AWS keys and installing keyloggers.

However, there are several reasons to believe the "OpenClaw nightmare" is manageable: 

  • Because OpenClaw is a personal assistant, its reach is inherently limited to the individual user’s scope. Unlike a compromised server in a data center, a compromised personal agent doesn't automatically grant an attacker "lateral movement" across the entire corporate network. It is a localized threat, not a viral one.
  • Enterprises should be naturally slow to adopt OpenClaw because it is, at its core, a tool for personal productivity. It doesn't naturally fit into standard corporate job workflows or centralized management systems. 
  • If an enterprise decides that the risk is too high, it can neutralize it relatively easily.   Because it relies on specific ports and gateway URLs, security teams can effectively block it at the network edge or add it to an endpoint "prevent list".

Ultimately, while the alarms are loud, a bit of perspective is necessary. In the initial stages of any major innovation, productivity and adoption speed almost always take priority over security concerns - and that’s not evidence of negligence, it’s a pattern we’ve seen repeatedly. We saw this with cloud infrastructure, with SaaS applications, with mobile devices, and with open-source package ecosystems. Rapid adoption came first. Guardrails followed.

Main Attack Paths

Attackers are already capitalizing on these weaknesses through four primary vectors:

  1. Poisoned Skills: attackers upload professional-looking plugins to ClawHub that contain hidden malicious code. Once installed, these skills inherit the agent’s full system permissions to exfiltrate data.
  2. Indirect Prompt Injection: an attacker can send an email or hide text on a webpage that, when processed by OpenClaw, instructs it to steal chat histories, exfiltrate credentials, or perform network reconnaissance.
  3. Cross-Site WebSocket Hijacking (CSWSH): the agent exposes a local WebSocket-based Gateway that accepts command traffic. If origin validation and authentication controls are insufficient, a malicious website visited by the user can silently initiate a WebSocket connection from the browser to the local OpenClaw service - allowing remote commands to be issued without directly exposing the Gateway to the internet. 
  4. Full control through exposed control panels: in earlier versions, the Control UI was bound to all network interfaces and did not require authentication for traffic considered local. This design created a dangerous edge case: if a reverse proxy was misconfigured, external requests could be forwarded in a way that made them appear local to the agent. 

The VirusTotal Solution: A Partial Band-Aid

On February 8, OpenClaw announced a partnership with VirusTotal to scan all skills published on the ClawHub marketplace. The move signals a clear effort to strengthen ecosystem security. Still, it addresses only part of the problem.

VirusTotal is highly effective at detecting known malicious binaries and suspicious code signatures, but it struggles with “malicious language”, as harmful intent can be embedded in logic or language. For instance, a prompt injection hidden inside a text file may appear entirely harmless to a conventional scanner, even though it can manipulate agent behavior once executed.

Secondly, there is also a structural limitation in the fact that VirusTotal scans a skill at the moment it is downloaded. A skill that appears clean today could later be updated to include harmful functionality. Point-in-time scanning cannot account for changes introduced after initial approval.

Finally, malware detection is not the same as risk assessment. VirusTotal can identify suspicious binaries, but it does not determine whether a skill is requesting excessive permissions or not covered by various security controls. 

Potential Mitigations

As concerns around OpenClaw have grown, defensive controls across multiple layers of the stack have begun adapting.

Endpoint detection and response (EDR) tools are currently the most effective line of defense, largely because OpenClaw leaves distinct filesystem and process artifacts. Its behavior is observable. Vendors such as SentinelOne and CrowdStrike have introduced behavioral indicators designed to detect 1-click kill chains. These detections monitor for the OpenClaw Gateway process - specifically a node instance running gateway.js - attempting to disable Docker sandboxing or spawning unexpected child shells like /bin/zsh or cmd.exe without any corresponding user interface interaction.

On macOS environments, Jamf has issued a dedicated protection strategy for enterprise fleets. The company added OpenClaw’s macOS companion application (Team ID: Y5PE65HELJ) to its Custom Prevent List and published detection scripts that monitor whether installed skills attempt to access sensitive directories such as ~/Library/Keychains.

Kaspersky has taken a configuration-focused approach, flagging unauthenticated OpenClaw administrative interfaces as a “High Risk” misconfiguration during system audits.

Beyond the EDRs, WAFs are being updated in response to Cross-Site WebSocket Hijacking (CSWSH), which has emerged as a primary exploitation method. Because these attacks rely on bridging a malicious website to a locally running agent, WAF vendors are working to disrupt that connection. Azure WAF updated its Default Rule Set (DRS) 2.2 to include checks targeting abuse of the gatewayUrl query parameter—identified as a key vector in token exfiltration attacks. Cloudflare has introduced managed rules that block outbound WebSocket handshakes containing OpenClaw-specific headers when the Origin header does not match a verified domain. In addition, many administrators have begun manually blocking the string gatewayUrl= at the network edge to prevent malicious “1-click” links from reaching users in the first place.

At the network layer, attention has centered on OpenClaw’s default port, 18789. Community rules for Snort and Suricata now detect unencrypted WebSocket traffic on that port, looking for the characteristic JSON-RPC handshake used by the OpenClaw Gateway. Palo Alto Networks’ Unit 42 has categorized openclaw.ai and clawhub.ai within its URL filtering databases as “AI Tools” and “Potentially Unwanted Applications (PUA),” giving organizations the option to block access to the marketplace entirely.

Finally, identity providers are adding another containment layer. Okta has introduced Advanced Posture Checks that can deny access to corporate applications if a device is running an active OpenClaw instance. The goal is to prevent a compromised agent from leveraging an active SSO session to access internal systems and sensitive data.

Taken together, these measures reflect a broad, multi-layered response—endpoint, web, network, and identity—aimed at containing the risks introduced by agent-based systems operating on user devices.

Conclusions

The meteoric rise of OpenClaw from a viral GitHub experiment to a focal point of the 2026 security debate has reached its most pivotal milestone yet: OpenAI’s announcement that it is bringing on OpenClaw creator Peter Steinberger to lead its next generation of personal agents. By transitioning the project into a supported open-source foundation, OpenAI is signaling that the application layer of the AI stack - the hyper-connected, high-privileged space where agents evolve - is now the most valuable territory in the AI stack, eventually more than the underlying models themselves. While this backing promises to professionalize the project's security posture, it leaves enterprise security teams in a precarious spot - as they are growingly being asked to defend a chaotic perimeter that now includes various autonomous and identity-inheriting agents, while trying to keep up with an exponential pace of technology change.

A Practical Guide: Evolving from VM to CTEM

Traditional vulnerability management must change. So many are drowning in detections, and still lack insights. The time-to-exploit window sits at 5 days. Implementing a Continuous Threat Exposure Management (CTEM) program is the path forward. Moving from vulnerability management to CTEM doesn't have to be complicated. This guide outlines steps you can take to begin, continue, or refine your CTEM journey.

Download Now
CTEM Whitepaper cover
Discover how Zafran Security can streamline your vulnerability management processes.
Request a demo today and secure your organization’s digital infrastructure.
Discover how Zafran Security can streamline your vulnerability management processes.
Request a demo today and secure your organization’s digital infrastructure.
Request Demo
On This Page
Share this article: