Home OSINT News Signals
CYBER2026-03-01

ClawJacked attack let malicious websites hijack OpenClaw to steal data

Security researchers have disclosed a high-severity vulnerability in the popular AI agent OpenClaw, dubbed "ClawJacked." This critical flaw allowed a malicious website to silently brute-force access to a locally running instance, effectively hijacking the agent to steal sensitive data. The attack represents a sophisticated new vector for data breach incidents, exploiting the trusted relationship between a user's local applications and web browsers.

The ClawJacked vulnerability functioned as a zero-day exploit, unknown to the developers until its public disclosure. Attackers could craft a phishing page that, when visited, would communicate directly with the OpenClaw agent on the victim's machine. This bypassed standard authentication, granting the malicious site full control without any user interaction or warning.

Once compromised, the hijacked OpenClaw instance could be commanded to exfiltrate files, credentials, and other private information from the host system. Experts warn this method could easily be adapted to deploy ransomware or other destructive malware, turning a simple website visit into a catastrophic security event.

The core of the exploit lies in a weakness in OpenClaw's local API, which lacked proper origin validation. This vulnerability made it possible for any webpage to send commands, assuming it could guess or brute-force a local access token. The researchers demonstrated a reliable attack that could complete in mere seconds.

This incident underscores the growing risks as AI agents become more prevalent. Their deep system integration, while useful, creates new attack surfaces. Cybersecurity professionals are urging all users of OpenClaw to immediately update to the latest, patched version to close this security gap.

In response to the disclosure, the OpenClaw development team has released an emergency patch. The fix implements strict validation checks, ensuring only authorized, local processes can communicate with the agent's API. They have also initiated a broader code audit to hunt for similar flaws.

The discovery has sparked discussions about secure architecture for local AI tools. Some proponents suggest leveraging blockchain security principles, such as immutable execution logs, to create verifiable audit trails for agent actions, though this is a longer-term consideration.

For now, user vigilance remains paramount. Organizations are advised to combine technical patches with renewed employee training on phishing threats. The ClawJacked attack proves that even advanced software can be compromised through foundational vulnerabilities, making proactive cybersecurity more essential than ever.

Back to News