As open-source AI agent project OpenClaw has surpassed 320,000 stars on GitHub and risen to the top ten repositories worldwide, hackers are eyeing this lucrative target. Security firm OX Security has reported recent large-scale phishing campaigns targeting developers, where hackers use GitHub’s tagging feature to spread false messages about “claiming $5,000 CLAW tokens,” tricking users into clicking links and draining their crypto wallets.
(Background: Full transcript of Jensen Huang’s GTC 2026 speech: AI demand reaches trillions of dollars, computing power jumps 350 times, OpenClaw turns every company into AaaS)
(Additional context: China’s Ministry of State Security warns of “Lobster Farming”: OpenClaw contains four major security mines, your device could be compromised)
Table of Contents
Toggle
- GitHub “Tagging” Feature Hijacked by Malicious Actors
- “Pixel-perfect” Website Cloning Hidden Wallet Drainers
- Founder Urgently Clarifies: No Token Promotions for OpenClaw
- Multiple Attack Vectors: Fake Installers and Malicious Plugins
Amid the wave of AI Agents, popular open-source projects are becoming new battlegrounds for targeted hacker attacks. According to a security alert issued by OX Security on March 18, a “wallet draining” operation targeting OpenClaw supporters is currently underway.
GitHub “Tagging” Feature Hijacked by Malicious Actors
This attack has caught many veteran developers off guard due to its use of “living-off-the-land” social engineering tactics. Hackers leverage the GitHub API to filter high-value targets who have starred (liked) the OpenClaw project, then open discussion threads in malicious repositories and simultaneously tag dozens of developers.
Since these notifications come from GitHub’s official email address ([email protected]), they are highly convincing. The attackers claim that the recipient has been selected to receive a $5,000 “CLAW” token reward, luring victims to phishing sites.
“Pixel-perfect” Website Cloning Hidden Wallet Drainers
According to OX Security’s technical analysis, hackers have set up malicious domains like token-claw[.]xyz, which nearly perfectly replicate the official OpenClaw website (openclaw.ai). However, these phishing sites include a critical “Connect your wallet” button.
Once clicked, a hidden “Wallet Drainer” script activates, supporting popular wallets like MetaMask and WalletConnect. The obfuscation script eleven.js communicates with the C2 server watery-compost[.]today, and after user authorization, instantly transfers all assets from the account.
Founder Urgently Clarifies: No Token Promotions for OpenClaw
In response to this aggressive attack, OpenClaw founder Peter Steinberger issued a stern warning on X (formerly Twitter):
“Everyone, if you receive emails or visit websites claiming to be related to OpenClaw and offering tokens, it’s definitely a scam. OpenClaw is a non-profit project, and we will never run such promotions.”
Folks, if you get crypto emails from websites claiming to be associated with openclaw, it’s ALWAYS a scam.
We would never do that. The project is open source and non-commercial. Use the official website. Be sceptical of folks trying to build commercial wrappers on top of it.
— Peter Steinberger 🦞 (@steipete) March 18, 2026
Multiple Attack Vectors: Fake Installers and Malicious Plugins
In fact, the security threat to OpenClaw extends beyond this. Earlier this month, cybersecurity researchers uncovered additional risks:
- Fake Installers: Malicious repositories leverage Bing AI search result rankings to distribute fake OpenClaw installers embedded with Vidar info-stealing trojans.
- NPM Supply Chain Attacks: Hackers released malicious packages like @openclaw-ai/openclawai, which deploy GhostLoader remote access trojans upon installation.
- ClawHub Malicious Plugins: In the “Skills” store designed for OpenClaw, up to 12% of plugins were found to contain AMOS info-stealing malware.
Currently, OpenClaw ranks ninth globally in popularity on GitHub. Security experts urge all developers to avoid testing unknown AI plugins on machines containing enterprise credentials or large digital asset stores, and to reject any “blind signature” authorization requests.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
RAVE’s hype surge triggers a flood of copycat coin mania, as FF and INX expose the “pump-and-dump” scheme
Recently, altcoins represented by RAVE have sparked a fierce investment craze, but some old star projects like FF and INX have used this wave of hype to carry out “pump-and-dump” operations—rapidly driving up coin prices to lure retail investors to buy, and then dumping them heavily, causing the price to plunge rapidly. Such behavior not only exposes the project team’s funding difficulties, but also damages investors’ trust. Investors need to stay alert to signals like abnormal short-term surges in order to avoid the risk of being manipulated by the market.
MarketWhisper1h ago
FBI teams up with Indonesia to dismantle W3LL phishing network, with more than $20 million involved
The U.S. FBI and Indonesian police successfully cooperated to dismantle a W3LL phishing network, seizing related equipment and detaining suspects. The W3LL phishing toolkit offers low-priced fake login pages that use man-in-the-middle attacks to easily bypass multi-factor authentication, forming an organized cybercrime ecosystem. This operation marks cooperation between the U.S. and Indonesia in law enforcement against cybercrime; however, the security threats to cryptocurrency users remain severe.
MarketWhisper5h ago
Squads Emergency Alert: Address poisoning and forged multisig accounts; a whitelist mechanism will go live
Solana ecosystem multi-signature agreement Squads issued a warning, pointing out that attackers launched an address poisoning attack against users by using fake accounts to trick users into making unauthorized transfers. Squads confirmed that there was no loss of funds and emphasized that this is a social engineering attack rather than a protocol vulnerability. To respond, Squads has implemented protective measures such as a warning system, non-interactive account prompts, and a whitelist mechanism. This incident reflects the growing social engineering threats in the Solana ecosystem and has prompted ongoing security reviews.
MarketWhisper5h ago
South Korean “retaliation intermediary” agencies charged USDT to carry out violent crimes, and continued operating even after the main suspect was arrested
South Korea has recently seen multiple “revenge intermediary” organizations that use cryptocurrency as a payment method. They offer intimidation and murder services via Telegram. Even though the main culprit has been arrested, related advertisements are still being posted. Police are investigating more than 50 cases and have arrested about 30 people.
GateNews7h ago
Fake Ledger App on Apple’s App Store Drains Musician’s 5.9 BTC Retirement Fund
A fake Ledger app on Apple's App Store deceived musician Garrett Dutton into losing 5.9 BTC by entering his seed phrase. This case highlights ongoing wallet scams and the exploitation of trust, as the stolen bitcoin was laundered through KuCoin.
CryptoNewsFlash11h ago
A CEX Faces Extortion and Refuses to Back Down: Affects About 2,000 Accounts, Customer Funds Are Not at Risk
A certain cryptocurrency exchange was extorted by a criminal organization, which claimed it would release internal system access videos. The exchange confirmed it had not suffered a systemic breach, that customer funds are safe, and that due to improper conduct by customer service personnel, data from approximately 2,000 accounts was accessed. The exchange has revoked the relevant permissions and strengthened security controls. The company is working with law enforcement agencies to investigate.
GateNews14h ago