CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-3VVQ-Q2QC-7RMP
6.9

GHSA-3VVQ-Q2QC-7RMP: Remote Code Execution via Missing Integrity Check in OpenClaw Package Manager

Amit Schendel
Amit Schendel
Senior Security Researcher

Apr 9, 2026·6 min read·4 visits

Active Exploitation

Executive Summary (TL;DR)

OpenClaw versions prior to 2026.3.1 download and execute remote AI skills without integrity verification. Attackers exploited this flaw to distribute over 340 malicious packages, resulting in remote code execution and credential theft across affected instances.

The OpenClaw personal AI assistant framework contains a severe architectural flaw in its ClawHub package management system. The client fails to verify the cryptographic integrity of downloaded skill packages, enabling supply chain attacks and remote code execution via poisoned upstream repositories.

Vulnerability Overview

The OpenClaw framework utilizes a package management system named ClawHub to distribute modular AI extensions known as skills. The ClawHub client implementation prior to version 2026.3.1 fails to enforce cryptographic integrity verification on downloaded skill packages. This design flaw allows threat actors to substitute legitimate skill files with malicious payloads during the installation process or within upstream repositories.

The vulnerability is tracked as GHSA-3VVQ-Q2QC-7RMP and classified under CWE-353, representing a failure to support integrity checks. The Common Vulnerability Scoring System (CVSS) calculates a score of 6.9, reflecting a high impact on confidentiality, integrity, and availability. The attack vector requires user interaction to initiate the package download, which inherently limits the base severity score.

Successful exploitation results in arbitrary code execution within the context of the OpenClaw host process. AI skills require extensive system permissions to function, granting the executing code broad access to local file systems, environment variables, and network interfaces. The lack of validation fundamentally breaks the trust model of the framework and enables widespread supply chain attacks against the OpenClaw ecosystem.

Root Cause Analysis

The installation mechanism relies on the OpenClaw clawhub install <skill-slug> command to initiate a remote fetch operation. This routine retrieves package contents directly from the central clawhub.ai registry or third-party Git repositories. A standard skill package contains a declarative SKILL.md file alongside executable source code. The client fetches these remote assets via standard HTTP requests without requesting or verifying a corresponding cryptographic hash or digital signature.

Following the download phase, the OpenClaw framework immediately registers the skill and executes its initialization logic. The framework relies on a declarative setup routine embedded directly within the downloaded SKILL.md installer file. Because the integrity of this file is never mathematically proven, any transit-level or repository-level modification executes automatically. The framework processes the file contents assuming local origin trust, bypassing standard execution safeguards.

The core architectural oversight stems from prioritizing rapid prototyping over secure package management principles. The system implicitly trusts the transport layer and the origin server, failing to account for compromised upstream repositories or man-in-the-middle network interception. This omission violates established security standards for decentralized software distribution systems.

Code Analysis

The vulnerable implementation resides in the package resolution and download modules of the ClawHub client. Before the B-M3 milestone patch, the fetch routine processed the network response stream directly into the local file system. The code lacked any intermediate buffer analysis, relying entirely on the native fetch streams. The application passed the resulting file path directly to the execution handler.

The patch introduces a mandatory checksum validation step during the package download phase. The updated code buffers the download and calculates an SHA-256 hash before committing the file to disk.

// Vulnerable Implementation (Pre 2026.3.1)
async function downloadSkill(slug: string, targetPath: string) {
    const response = await fetch(`https://clawhub.ai/api/skills/${slug}/download`);
    const fileStream = fs.createWriteStream(targetPath);
    await streamPipeline(response.body, fileStream);
    return executeSetup(targetPath); // Arbitrary execution without verification
}
 
// Patched Implementation (Post 2026.3.1)
async function downloadSkill(slug: string, targetPath: string) {
    const response = await fetch(`https://clawhub.ai/api/skills/${slug}/download`);
    const expectedHash = await fetchSignature(slug); // Retrieve trusted metadata
    const fileBuffer = await response.buffer();
    
    const actualHash = crypto.createHash('sha256').update(fileBuffer).digest('hex');
    if (actualHash !== expectedHash) {
        throw new SecurityError("Integrity verification failed");
    }
    
    fs.writeFileSync(targetPath, fileBuffer);
    return executeSetup(targetPath); // Safe execution of verified file
}

The updated function guarantees that the executed payload matches the cryptographic signature provided by the registry authority. If the calculated hash deviates from the expected signature, the system throws a SecurityError and halts execution. This provides a strict integrity boundary and neutralizes the supply chain injection vector.

Exploitation Methodology

Threat actors exploit this vulnerability by publishing malicious skills or compromising existing upstream repositories. Attackers heavily utilize typosquatting techniques to register skill names that closely resemble popular AI extensions. In February 2026, security researchers identified 341 distinct malicious skills residing on the central ClawHub registry. These packages relied exclusively on the missing integrity checks for widespread distribution.

The primary exploitation technique transforms the SKILL.md file into a two-stage dropper. Attackers embed obfuscated setup routines within the markdown declaration that execute external scripts upon initialization. For example, a malicious skill named yahoofinance used this vector to silently download an executable payload immediately after the user initiated the install command. The framework parses and runs this embedded routine without user confirmation.

Once the secondary payload executes, it targets the host environment for credential harvesting and persistence. The yahoofinance dropper parsed local environment variables and extracted SSH keys from the user's home directory. The initial execution context grants the payload identical system privileges to the user running the OpenClaw instance.

Mitigation and Remediation

The OpenClaw development team addressed the missing integrity check vulnerability in version 2026.3.1 as part of the Bug Milestone 3 (B-M3) release. This update implements strict cryptographic hash verification for all skill downloads and introduces a verified publisher framework. Administrators must upgrade all OpenClaw instances to this patched version to secure the package management lifecycle. Upgrading removes the technical capacity for arbitrary code execution via compromised dependencies.

Post-upgrade, operators must validate previously installed skills to ensure no malicious packages remain active. The patched client includes a new command line utility specifically designed for retroactive integrity auditing. Executing the npx clawhub@latest verify --all command analyzes the local skill directory against the central registry's verified signatures. Administrators should immediately uninstall any packages that fail this verification process.

Organizations utilizing OpenClaw should implement manual vetting procedures for critical AI skills as a defense-in-depth measure. Security teams must review the SKILL.md setup routines for anomalous network calls, such as unexpected curl or wget commands that bypass standard execution paths. Integrating community security tools like clawsec into development pipelines provides automated reputation scoring and behavioral analysis for ClawHub packages.

Official Patches

OpenClawOfficial OpenClaw GitHub Repository containing the B-M3 patch.

Technical Appendix

CVSS Score
6.9/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Systems

OpenClaw FrameworkClawHub Package Manageropenclaw/openclaw

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenClaw
OpenClaw
< 2026.3.12026.3.1
AttributeDetail
CWE IDCWE-353
Attack VectorNetwork
CVSS Score6.9
ImpactHigh (Confidentiality, Integrity, Availability)
Exploit StatusActive Exploitation
KEV StatusNot Listed

MITRE ATT&CK Mapping

T1195.002Supply Chain Compromise: Compromise Software Supply Chain
Initial Access
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-353
Missing Support for Integrity Check

Missing Support for Integrity Check

Known Exploits & Detection

Penligent Hacking LabsClawHub Poisoning Playbook detailing the exploitation of SKILL.md as a dropper.
Silverfort ResearchAnalysis of ranking manipulation used to promote malicious ClawHub skills.

Vulnerability Timeline

Initial community warnings regarding the lack of integrity checks in OpenClaw.
2026-02-04
Penligent publishes the ClawHub Poisoning Playbook detailing exploitation methods.
2026-02-12
CISO guide for securing OpenClaw released to the public.
2026-03-12
Silverfort discloses ranking manipulation vulnerabilities in ClawHub.
2026-03-24
Arxiv paper provides formal technical analysis of the vulnerability ecosystem.
2026-03-29
GHSA-3VVQ-Q2QC-7RMP is officially published.
2026-04-07

References & Sources

  • [1]GitHub Advisory: GHSA-3VVQ-Q2QC-7RMP
  • [2]A Systematic Taxonomy of Security Vulnerabilities in the OpenClaw Ecosystem
  • [3]Silverfort: ClawHub Ranking Manipulation Analysis
  • [4]Penligent: The OpenClaw ClawHub Poisoning Playbook
  • [5]Aliyun Vulnerability Database: AVD-2026-1866873
  • [6]Prompt Security: Clawsec Assessment Tool

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.