341 Malicious Skills and Enabling One-Click Remote Code Execution


TL;DR

  • Critical Vulnerability: OpenClaw issued three high-impact security advisories, including CVE-2026-25253, which enables one-click remote code execution.
  • Malicious Ecosystem: Koi Security identified 341 malicious skills on ClawHub that install Atomic Stealer malware on macOS systems.
  • API Cost Crisis: Users reported burning through $20 in API tokens overnight, with projected monthly costs reaching $750 for simple operations.
  • Public Exposure: Censys tracked over 21,000 OpenClaw instances exposed on the public Internet as of January 31, 2026.

OpenClaw, a new and extremely viral autonomous AI assistant, has exposed users to steep API costs and high-severity security vulnerabilities.

Ex-xAI developer Benjamin De Kraker reported burning through $20 in API tokens overnight while the assistant simply checked the time every 30 minutes. De Kraker’s heartbeat cron job sent approximately 120,000 tokens of context to Anthropic’s Claude Opus 4.5 model with each check, costing roughly $0.75 per execution. Across 25 checks, the bill totaled nearly $20. He calculated that running reminders over a month could cost around $750.

Infrastructure risks have drawn sharp criticism. “OpenClaw is a security dumpster fire,” Laurie Voss, Head of Developer Relations at Arize and Founding CTO of npm, wrote on LinkedIn.

What Is OpenClaw?

OpenClaw launched in November 2025 as an autonomous AI assistant based on the Pi coding agent. Previously known as Clawdbot, then Moltbot, the project attracted attention from developers Simon Willison and Andrej Karpathy with large social media followings among AI enthusiasts.

OpenClaw’s GitHub repository crossed 149,000 stars as of February 2. This viral adoption, however, came at a steep cost. Combined with minimal security vetting, the platform creates an attack surface that scales faster than security controls can adapt.