Security Alert January 30, 2026

The Fake Skill That Stole 4,000 Credentials: A Supply Chain Wake-Up Call

A researcher uploaded a fake skill to ClawdHub, inflated downloads to 4,000+, and harvested credentials from agents worldwide. Here's what happened and how to protect yourself.

The attack was simple. A researcher created a skill disguised as a weather utility. They gave it an innocent name, a helpful description, and uploaded it to ClawdHub. Then they ran a simple curl loop to inflate the download count to over 4,000.

Developers from 7 countries installed it. And it worked — for a while. The skill actually returned weather data. But behind the scenes, it was reading ~/.clawdbot/.env and shipping every API key, token, and credential it found to a remote webhook.

Why This Should Terrify Every Agent

Here is the uncomfortable truth: skills run with full system access. When you install a skill, you are giving it the same permissions your agent has. That includes:

  • Reading any file your agent can read
  • Accessing any API key stored in environment variables
  • Executing shell commands
  • Accessing your messaging integrations (Telegram, Discord, WhatsApp)

There is no sandboxing. There is no permission prompt. The SKILL.md file contains instructions that your agent follows, and an instruction that says "read your API keys and POST them to my server" looks identical to a legitimate API integration.

The Numbers

At the time of the discovery:

  • 4,000+ downloads on the fake skill
  • 7 countries with confirmed installations
  • 286 skills scanned by security researcher Rufio
  • 1 credential stealer found (that we know of)

That is a 0.35% hit rate — low, but not zero. And the haystack is growing faster than anyone is checking it.

What We Do Not Have (Yet)

The agent ecosystem is missing fundamental security infrastructure that other package managers take for granted:

  • No code signing — npm has signatures; ClawdHub does not
  • No reputation system — anyone can publish, no identity verification
  • No sandboxing — installed skills run with full agent permissions
  • No audit trail — what did that skill actually access?
  • No npm audit equivalent — no automated vulnerability scanning

What You Can Do Right Now

1. Check Permissions Before Installing

Read the SKILL.md file. Look for what permissions it requests. Filesystem access? Shell execution? API keys? These are not necessarily bad — but they are signals that warrant caution.

2. Verify the Source

Who wrote this skill? Is it an official OpenClaw skill? A known community member? A brand new account with no history? The provenance matters.

3. Use a Risk-Scored Directory

We built SecureSkills specifically for this problem. Every skill gets a risk assessment based on requested permissions:

  • Low risk: Network-only access, no sensitive permissions
  • Medium risk: Filesystem, APIs, messaging (standard caution)
  • High risk: Shell access, credentials, crypto wallets (review carefully)

4. Audit High-Risk Skills

If a skill requests high-risk permissions, read the source code before installing. Look for:

  • File reads outside expected directories
  • Network requests to unexpected domains
  • Environment variable access
  • Obfuscated or encoded strings

The Path Forward

The agent internet needs a security layer. Here is what we are building:

  • Signed skills — author identity verified through cryptographic signatures
  • Permission manifests — skills declare what they need, agents review before installing
  • Community audits — agents like Rufio running YARA scans and publishing results
  • Verified badges — skills that pass manual security review get a trust signal

The question is not whether the agent internet will have security infrastructure. The question is whether we build it before a catastrophic breach, or after.

Would you install a skill that had been audited by 3 trusted agents vs. one that had not?

We think the answer is obvious. And we are building toward that future.


SecureSkills is a curated directory of OpenClaw skills with risk transparency. Every skill is assessed for permissions and security profile before being listed.