🐯虎嗅•Stalecollected in 18m
Women Tackle OpenClaw AI Safety Risks

💡OpenClaw safety fail + Fei-Fei Li spatial AI: risks & ethics for builders.
⚡ 30-Second TL;DR
What Changed
OpenClaw AI agent surges to 160k GitHub stars as '24/7 AI employee'.
Why It Matters
Highlights urgent AI agent safety gaps and women's key roles in defining ethics and foundations amid low representation.
What To Do Next
Replicate Summer Yue's OpenClaw email test to audit your AI agent's instruction adherence.
Who should care:Developers & AI Engineers
🧠 Deep Insight
Web-grounded analysis with 9 cited sources.
🔑 Enhanced Key Takeaways
- •Cybersecurity researcher @fmdz387 discovered nearly 1,000 publicly accessible OpenClaw installations without authentication in late January 2026 using Shodan.
- •Jamieson O’Reilly accessed users' Anthropic API keys, Telegram tokens, Slack accounts, and chat histories from exposed OpenClaw instances, enabling full admin command execution.
- •Over 230-341 malicious skills were published on ClawHub and GitHub from January 27 to February 1, 2026, using social engineering to distribute malware like keyloggers and Atomic Stealer.
- •Oasis Security disclosed ClawJacked (CVE-2026-25253), a WebSocket vulnerability allowing remote code execution from malicious websites, patched in version 2026.2.25.
- •22% of enterprise customers have unauthorized 'shadow AI' OpenClaw deployments on corporate networks, expanding vulnerabilities via VPN access.
🔮 Future ImplicationsAI analysis grounded in cited sources
OpenClaw deployments in enterprises will require mandatory isolated environments by mid-2026
Shadow AI spread and vulnerabilities like ClawJacked have prompted security teams to enforce VM/cloud isolation to mitigate network risks.
AI agent marketplaces will implement mandatory skill moderation within 6 months
Unmoderated ClawHub enabled 12% malicious skills, leading calls from Cisco and Mastercard for standards to prevent malware distribution.
⏳ Timeline
2026-01
Researcher @fmdz387 scans reveal ~1,000 exposed OpenClaw instances without authentication.
2026-01
Jamieson O’Reilly demonstrates access to API keys and admin privileges on misconfigured instances.
2026-01-27
ClawHavoc: Attackers publish 230+ malicious skills on ClawHub.
2026-01-29
Total malicious skills reach 341 out of 2,857 in ClawHub registry.
2026-01
Mav Levin discloses CVE-2026-25253 WebSocket RCE vulnerability.
2026-02-25
OpenClaw patches ClawJacked flaw and requires gateway authentication by default.
📎 Sources (9)
Factual claims are grounded in the sources below. Forward-looking analysis is AI-generated interpretation.
- kaspersky.com — 55263
- blogs.cisco.com — Personal AI Agents Like Openclaw Are a Security Nightmare
- digitalocean.com — Openclaw Security Challenges
- thehackernews.com — Clawjacked Flaw Lets Malicious Sites
- fortune.com — Openclaw AI Agents Security Risks Beware
- oasis.security — Openclaw Vulnerability
- reco.ai — Openclaw the AI Agent Security Crisis Unfolding Right Now
- mastercard.com — Openclaw AI Security Standards
- bitsight.com — Openclaw AI Security Risks Exposed Instances
📰
Weekly AI Recap
Read this week's curated digest of top AI events →
👉Related Updates
AI-curated news aggregator. All content rights belong to original publishers.
Original source: 虎嗅 ↗