BotBeat
...
← Back

> ▌

OpenClawOpenClaw
INDUSTRY REPORTOpenClaw2026-04-29

30 OpenClaw Skills Weaponized for Crypto Swarm Without User Consent

Key Takeaways

  • ▸30 OpenClaw skills on ClawHub have been used to create a 'crypto swarm' that recruits AI agents without user consent or awareness
  • ▸The campaign uses legitimate SKILL.md configuration files to instruct agents to register with external servers, report capabilities, and generate cryptocurrency wallets
  • ▸ClawSwarm reveals a fundamental gap in runtime visibility for agentic AI systems—agents can execute complex third-party instructions without explicit user approval
Source:
Hacker Newshttps://www.theregister.com/2026/04/29/30_clawhub_skills_mine_crypto/↗

Summary

A security researcher at Manifold has discovered a campaign dubbed "ClawSwarm" in which 30 OpenClaw skills published to ClawHub have been covertly co-opting AI agents for cryptocurrency mining operations. The malicious skills, published by a user named "imaflytok," have accumulated around 9,800 downloads and operate without any traditional malware or explicit user knowledge.

Once installed, these seemingly benign skills—ranging from cron helpers to security utilities—cause AI agents to silently register with external servers (onlyflies.buzz), report their capabilities and installed skills, generate Hedera crypto wallets, and accept remote tasks. The agents store credentials locally, check in every four hours, and participate in a network centered around $FLY tokens—all without the agent owner's approval or awareness.

Maniford researcher Ax Sharma emphasizes that ClawSwarm differs from traditional malicious campaigns because it exploits no code vulnerabilities and uses no malware. Instead, it leverages legitimate SKILL.md configuration files to instruct agents what to do. The campaign raises critical questions about runtime visibility and user control in agentic AI systems, particularly as open-source agent frameworks gain adoption.

  • Traditional code scanning tools cannot detect this attack pattern, forcing the security community to rethink how agent ecosystems are governed

Editorial Opinion

ClawSwarm exposes a critical governance gap in how AI agents execute third-party skills without explicit runtime approval from human users. While this particular campaign may be a legitimate cryptocurrency experiment, the mechanism—silent agent enrollment in external networks, wallet generation, and remote task execution—represents a template that far more malicious actors could exploit. Open-source agent ecosystems urgently need robust runtime visibility, capability-based permissions, and user control mechanisms before they can be considered production-ready for enterprise or security-sensitive applications.

AI AgentsCybersecurityEthics & BiasOpen Source

More from OpenClaw

OpenClawOpenClaw
INDUSTRY REPORT

China's OpenClaw AI Craze Sparks a Cottage Industry as Entrepreneurs Cash In on Installation Services

2026-04-20
OpenClawOpenClaw
INDUSTRY REPORT

OpenClaw's 'Lobster' Phenomenon Reveals China's AI Ambitions and Grassroots Innovation

2026-04-06
OpenClawOpenClaw
INDUSTRY REPORT

OpenClaw Uninstallation Services Boom in China as Users Seek to Remove Viral AI Agent

2026-03-17

Comments

Suggested

Delphi SecurityDelphi Security
PRODUCT LAUNCH

Phi Browser Launches Local-First AI Browser for macOS with Proactive Memory System

2026-04-29
Google / AlphabetGoogle / Alphabet
PARTNERSHIP

Google Moves Forward with Pentagon AI Deal Despite Employee Pushback

2026-04-29
Anysphere (Cursor)Anysphere (Cursor)
PRODUCT LAUNCH

Cursor Launches Public Beta SDK for Building and Deploying AI Coding Agents

2026-04-29
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us