Back to Blog
Reading time: ~9 min | Last updated: March 3, 2026 | Category: Security Alerts

Is Your Workstation Compromised? The ClawJacked Zero-Click Exploit Explained

By T.O. Mercer | March 3, 2026

CVE-2026-25253 (ClawJacked) allows any malicious website to silently hijack your local OpenClaw agent through a cross-origin WebSocket attack. No clicks. No downloads. No plugins. Just visiting the wrong webpage.

ClawJacked CVE-2026-25253 attack chain diagram showing WebSocket hijack from malicious site to OpenClaw gateway to full workstation compromise
ClawJacked (CVE-2026-25253) allows websites to hijack OpenClaw AI agents via cross-origin WebSocket attacks.

Back in January, we published our complete guide to deleting OpenClaw and warned that uninstalling the app wasn't enough. We talked about the "Lethal Trifecta" of agent risks: Data Access, Untrusted Skills, and Persistent Communication.

We didn't expect the situation to get this bad, this fast.

In the five weeks since that guide went live, security researchers have disclosed seven CVEs against OpenClaw, including remote code execution (RCE), command injection, and authentication bypass flaws. The latest and most dangerous is ClawJacked, a zero-click vulnerability that lets attackers take full control of your AI agent from their website. No social engineering required. This is a supply chain attack against your entire development environment.

If you're still running OpenClaw, this is the article that should make you stop.


The Attack Vector: How ClawJacked Works

Most vulnerability write-ups bury the impact under technical jargon. So let me be blunt about what this means for you.

OpenClaw runs a gateway service on your local machine. That gateway uses WebSocket connections to talk to the rest of the system. The problem? Browsers enforce Cross-Origin Resource Sharing (CORS) policies for HTTP requests, but those protections do not apply to WebSocket connections. Your browser will happily open a WebSocket to localhost on behalf of any website you visit.

And OpenClaw's gateway made it worse by failing to validate the WebSocket Origin header. That means the gateway had no way to distinguish between a legitimate local connection and a malicious one coming from an attacker's website through your browser. That is the "Security 101" mistake at the core of this entire vulnerability.

Here is the attack in four steps:

  1. The Hook: You visit a compromised website. Could be a poisoned blog post, a phishing link, a watering hole attack targeting developers. Nothing unusual happens on screen.
  2. The Silent Probe: Background JavaScript on that page scans for your local OpenClaw gateway port and opens a WebSocket connection. Because CORS doesn't block WebSocket handshakes to localhost and the gateway doesn't check the Origin header, the browser lets it through without a warning.
  3. The Brute Force: The script hammers your gateway password. Because OpenClaw exempts localhost from rate limiting, the attacker gets hundreds of guesses per second with zero throttling and zero logs. Oasis Security confirmed sustained brute-force rates from browser JavaScript alone in their lab testing.
  4. Full Hijack: The attacker exploits OpenClaw's "Auto-Pairing" feature, which automatically trusts localhost-originating connections for device registration. The script registers itself as a trusted "Shadow Device" without triggering an approval prompt or notification. The attacker now has full interactive access to your AI agent and every system it connects to.

That is it. You visited a webpage. Now someone else controls your OpenClaw agent.

From there, the post-exploitation possibilities are wide open. They can read your Slack messages, search your Gmail, access your GitHub repos, scan your files, and execute shell commands on any connected device. Oasis Security called it a pathway to "full workstation compromise."

The ClawJacked Attack Chain

Pro Tip for Advanced Users: If you must keep OpenClaw running while you evaluate alternatives, bind the gateway strictly to 127.0.0.1 (not 0.0.0.0 or a loose localhost definition) and change it to a non-standard port. The default port 18789 is what automated browser scripts scan for first. This is not a fix. It is a speed bump that buys you time while you migrate. The only real fix is updating to v2026.2.25+ or deleting the app entirely.


The Damage Is Already Done

This is not a theoretical risk. The fallout from OpenClaw's security failures hit the news throughout February 2026.

Real-World Impact: In February 2026, a misconfigured OpenClaw agent deleted a Meta executive's entire email inbox despite explicit "do not touch" instructions. The technical cause? "Context Compaction," where the agent's memory window was too small to hold both the large inbox contents and the original safety instruction. The agent "forgot" it wasn't supposed to delete anything. It acted autonomously, and the damage was irreversible. This is what happens when AI agents have broad system access and inadequate safety controls.

Google restricted OpenClaw users from its Antigravity platform, citing "malicious usage." Researchers at Trend Micro found a new variant of Atomic Stealer (a macOS info-stealing malware) being distributed through malicious skills on ClawHub, OpenClaw's community marketplace.

And ClawJacked was just one of seven vulnerabilities discovered in recent weeks:

CVE Severity Attack Type Status
CVE-2026-25253 High ClawJacked (WebSocket hijacking) Patched in v2026.2.25
CVE-2026-25593 High Remote code execution (RCE) Patched in v2026.2.14
CVE-2026-24763 High Command injection Patched in v2026.2.2
CVE-2026-25157 Moderate Server-side request forgery (SSRF) Patched in v2026.2.1
CVE-2026-25475 High Authentication bypass Patched in v2026.1.29
CVE-2026-26319 Moderate Path traversal Patched in v2026.2.14
CVE-2026-26322 / 26329 Varies Undisclosed Patched in v2026.2.14

Seven CVEs across six patch versions in roughly 30 days. That is not a product with isolated bugs. That is a product with fundamental security architecture problems.


Why Our "Lethal Trifecta" Warning Was Right

When we wrote the delete guide in January, we framed OpenClaw's risks around three pillars: Data Access, Untrusted Skills, and Persistent Communication. ClawJacked validates all three at once.

Data Access: ClawJacked gives attackers the same permissions your OpenClaw agent has. If the agent can read your Gmail, so can the attacker. If it has access to your Slack workspace, so does the attacker. Every OAuth token you granted to OpenClaw becomes the attacker's OAuth token.

Untrusted Skills: The ClawHub marketplace has been a known vector for weeks now. Over 1,000 malicious skills were discovered being used as delivery mechanisms for info-stealers, backdoors, and crypto scams. Trend Micro traced the malicious infrastructure to 91.92.242[.]30, an IP linked to the "Cookie Spider" threat group, a cybercrime actor known for renting out the Atomic Stealer (AMOS) macOS info-stealer. One of the skills appeared completely harmless on VirusTotal and was labeled benign. OpenClaw followed its installation instructions anyway because the LLM decided to.

Persistent Communication: This is the part most coverage misses. Even after you patch ClawJacked, the agent's connections to your cloud services remain active through OAuth tokens. A compromised agent could have already exfiltrated data, modified your configurations, or planted secondary access mechanisms. Patching the gateway does not undo what already happened through those connections. For the full breakdown of how these persistent connections work, see our OpenClaw Security Risks deep dive.

This is why we said in January that uninstalling OpenClaw isn't enough. You have to revoke the tokens. That advice hasn't changed. If anything, it's more urgent now.


What You Need to Do Right Now

If you're still running OpenClaw, you have two options. Pick one and execute it today.

Option 1: Patch and Lock Down

Update to OpenClaw version 2026.2.25 or later immediately. This version tightens WebSocket security checks and re-enables rate limiting on localhost connections. It also fixes the log poisoning vulnerability that allowed attackers to inject prompt injections into gateway logs.

After patching, check whether you were already compromised. Run these commands to scan your gateway logs for signs of ClawJacked exploitation:

# Check for unauthorized WebSocket connections (macOS)
grep "WebSocket" ~/Library/Logs/OpenClaw/gateway.log | grep -v "127.0.0.1"

# Check for unauthorized WebSocket connections (Linux)
grep "WebSocket" ~/.openclaw/logs/gateway.log | grep -v "127.0.0.1"

# Look for suspicious device registrations you didn't initiate
grep "device_register" ~/.openclaw/logs/gateway.log | grep -i "shadow\|unknown\|browser"

# Check for outbound connections to known malicious infrastructure
# (IP tied to Atomic Stealer/AMOS variant distributed via ClawHub skills)
grep -E "91\.92\.242\.30" ~/.openclaw/logs/gateway.log

# Check for ClawHub skill installations you don't recognize
ls -la ~/.molthub/skills/ 2>/dev/null

If any of those return results, assume compromise and skip to Option 2.

Additional post-patch steps:

  • Review all connected integrations and revoke anything unnecessary.
  • Set a strong, unique gateway password (not the default).
  • Restrict gateway binding to specific interfaces rather than accepting all localhost traffic.

Option 2: Delete It Entirely

If you've decided that nuking the app is safer than patching (and given seven CVEs in 30 days, that's a reasonable conclusion), use our step-by-step OpenClaw removal guide to ensure no hidden configs remain. The critical steps haven't changed:

  1. Kill the process and all its naming variants (openclaw, moltbot, clawdbot).
  2. Delete local files including the three hidden config directories.
  3. Revoke OAuth tokens from Google, Slack, Discord, GitHub, Microsoft, and Notion.
  4. Remove ClawHub skill caches from ~/.molthub.

That third step is still the one people skip. And it's still the one that matters most. Deleting the app without revoking tokens is like changing your locks but leaving copies of the key at every coffee shop in town.


Rotate Every Password OpenClaw Touched

Whether you patched or deleted, you need to assume that any credential OpenClaw had access to is compromised. That includes passwords stored in your browser, API keys in .env files, and anything visible in your Slack DMs or email threads.

Generate new passwords for every affected account. NIST SP 800-63B now recommends 15 characters minimum, and 16 is the current standard. Use our password generator to create unique replacements, then verify them with our password checker to make sure they meet 2026 entropy standards. Then take the 2-minute security quiz to find other vulnerabilities in your setup you may have missed.

Generate a secure password now

Use our free client-side generator. Nothing is sent to any server; all randomness happens in your browser with the Web Crypto API.

Generate Password →

After rotating credentials, reset your 2FA backup codes and re-enroll your authenticator app for any account OpenClaw had access to. If the agent could read your primary email, an attacker could have hijacked active sessions to bypass 2FA entirely.

Managing the Rotation at Scale

If you're rotating dozens of passwords (and you probably are), doing it manually is brutal. A password manager makes this survivable. I use NordPass for mine. Built-in breach scanner catches any credentials that were already exposed, zero-knowledge encryption means they can't read your vault, and it works across all devices. $1.99/month. Takes five minutes to set up and saves hours of credential management.

Try NordPass -- $1.99/mo

Affiliate link. I may earn a commission at no extra cost to you.


What to Use Instead of OpenClaw

You still need AI automation. You just need it without the security nightmares. We compared the safest alternatives in our full breakdown.

Security Comparison: OpenClaw vs. Safer Alternatives

Feature OpenClaw Claude Code n8n Zapier
Execution Model Full system access Sandboxed (MCP) Self-hosted Cloud-hosted
OAuth Token Handling Persistent, broad scope No persistent tokens Scoped per workflow Scoped per Zap
Shell Access Yes (all nodes) Sandboxed container No direct shell No shell access
Skill/Plugin Vetting ClawHub (unvetted) Curated MCP servers Community nodes (reviewed) Vetted integrations
Human-in-the-Loop Optional (often bypassed) Built-in confirmation HITL triggers Approval steps
CVEs in 2026 7+ (and counting) 0 0* 0

*n8n had a self-hosted RCE (CVE-2026-21858) in early January 2026. Versions 1.121.0 and later include the fix. Always run the latest patch.

The pattern is clear. OpenClaw gave the agent the keys to everything and assumed nothing would go wrong. The alternatives above enforce boundaries by design.

Read the full alternatives comparison →


The Bigger Problem Nobody Wants to Talk About

ClawJacked is a symptom. The disease is an industry that ships AI agents with broad system access and treats security as an afterthought.

OpenClaw has 100,000+ GitHub stars. High-profile founders hyped it as the future of personal automation. And the product had a critical vulnerability that let any website in the world take over a developer's entire workstation through a basic WebSocket connection that lacked CORS validation and rate limiting on localhost. The post-exploitation surface was enormous because the agent already had authenticated access to Gmail, Slack, GitHub, and whatever else the user had connected.

This was not a sophisticated attack. This was Security 101 material: don't trust local connections by default, enforce rate limiting everywhere, validate WebSocket origins, and treat AI agent permissions like you would any other privileged service account. The fact that these oversights existed in a tool with this much visibility and enterprise adoption tells you something about how the industry is prioritizing speed over safety.

The ClawHub marketplace situation makes it worse. Over 1,000 malicious skills means this is now a full supply chain attack vector. Developers install a skill that looks legitimate, passes VirusTotal scans, and then the LLM decides to follow its installation instructions. The remote code execution (RCE) potential is real. Trend Micro documented Atomic Stealer variants being delivered through this exact mechanism.

As AI agents move from experimental toys into production workflows, every integrated service expands the blast radius when something goes wrong. Your Slack workspace, your Gmail, your GitHub repos, your cloud infrastructure. One compromised agent touches all of it.

The question isn't whether the next OpenClaw-style vulnerability will appear. It's whether the next tool will have the same gaps.

Choose your tools carefully. Audit what you grant access to. And stop assuming that "runs locally" means "runs safely."


Frequently Asked Questions

What is ClawJacked?

ClawJacked (CVE-2026-25253) is a zero-click vulnerability in OpenClaw's gateway that allows malicious websites to hijack local AI agents via cross-origin WebSocket connections. The flaw was discovered by Oasis Security and patched in version 2026.2.25 on February 26, 2026.

Do I need to do anything if I already deleted OpenClaw?

If you followed our delete guide and revoked your OAuth tokens, you're in good shape. If you deleted the app but skipped the token revocation step, go do that now. The tokens are still active on Google, Slack, Discord, and other services until you manually revoke them.

Is patching to 2026.2.25 enough?

It fixes ClawJacked specifically, but given seven CVEs in 30 days, you should evaluate whether you want to continue using a product with this security track record. At minimum, audit all connected integrations, rotate credentials, and set a strong gateway password.

How do I know if my OpenClaw was compromised via ClawJacked?

Run the log scan commands from the "Patch and Lock Down" section above. Specifically, check your gateway logs for unexpected WebSocket connections and device registrations you didn't approve. Monitor for outbound traffic to 91.92.242[.]30 or other suspicious infrastructure. If your Shodan check from our delete guide shows "OpenClaw Control," assume full compromise and treat every connected account as breached.

What makes ClawJacked different from the January RCE vulnerability?

Both fall under CVE-2026-25253 and both exploit weaknesses in how the OpenClaw gateway handles WebSocket connections, but they are fundamentally different attack chains. The January flaw (patched in v2026.1.29) required you to click a crafted malicious link that exfiltrated your gateway token through the Control UI's unvalidated gatewayUrl parameter. It was a one-click RCE. ClawJacked (patched in v2026.2.25) requires zero interaction. Simply having OpenClaw running while visiting any compromised website is enough. The attacker's JavaScript silently connects to your gateway, brute-forces authentication through the unpatched localhost rate-limit bypass, and exploits the Auto-Pairing feature to register as a trusted device. ClawJacked is the more dangerous evolution: zero-click, silent, and fully automated.

For the complete step-by-step removal process, read our guide: Delete OpenClaw: Complete Guide (2026).

For safer AI automation alternatives, see: OpenClaw Alternatives 2026.

T.O. Mercer covers password security, digital hygiene, and applied cryptography at SafePasswordGenerator.net.

Related Articles

SECURITY GUIDES

Delete OpenClaw: Complete Guide (2026)

SECURITY ALERTS

OpenClaw Security Risks: What You Need to Know

AI TOOLS

Best OpenClaw Alternatives in 2026