17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware


Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000 stars on GitHub, OpenClaw is being exploited to steal crypto keys and install macOS malware. Discover how a single user linked to 199 fake skills is targeting wallets and corporate data.

A new open-source AI project called OpenClaw has taken the developer world by storm, racking up over 160,000 stars on GitHub. It is basically an AI toolbox that can manage your accounts and run tasks across different apps. However, as we know it, where there is a massive crowd, scammers are never far behind.

Researchers from Bitdefender Labs recently inspected this infrastructure and found something worrying. They discovered that roughly 17% of the ‘skills’- the small bits of code that give the AI its powers- found in the first week of February 2026 were actually malicious. For your information, these aren’t just minor bugs; they are designed to bypass security and steal your data.

A Modern Trojan Horse

According to Bitdefender Labs’ research, hackers are cloning popular tools and using slightly different names to blend in. Further investigation revealed a ‘Base Trading Agent’ skill that promised automated trading but was a major red flag, as it buried instructions in its description for users to download external files.

Scammers hiding malicious instructions in the description (Source: Bitdefender)

After installation, these skills act as a doorway; they reach out to a specific IP address (91.92.242.30) to fetch scripts that can take over a computer. While this was originally seen as a problem for individual users, researchers note that it has now spread into the corporate world, with hundreds of cases detected in business environments.

The Numbers Behind the Abuse

The research, which was shared with Hackread.com, shows that attackers are masquerading as helpful utilities, including tools for platforms like Polymarket, ByBit, and Axiom, and various decentralised exchanges (DEXs). Also included are wallet assistants and gas fee trackers for Solana, Base, Ethereum, and other Layer 2 (L2) networks. Crypto users are the primary targets as about 54% of all malicious skills are crypto-related, including:

  • Wallet trackers: 14%
  • Polymarket tools: 9.9%
  • Solana helpers: 9.3%
  • Phantom wallet tools: 8.2%

On the other hand, social media automation for YouTube, LinkedIn, Reddit, and X makes up 24% of threats, while fake “auto-updaters” account for 17%. Even Google Workspace productivity tools are being faked to target offices.

Auto-Updaters Skill (Source: Bitdefender)

From Skills to Stolen Keys

One specific user, known as sakaen736jih, was found linked to 199 of these malicious scripts. In some cases, the skills looked for files with the “.mykey” extension to steal private wallet keys. On Macs, they even delivered the AMOS Stealer virus, which researchers noted is capable of “harvesting credentials, browser data, and crypto-related information.”

To stay safe, Bitdefender recommends treating every new skill like a full software installation rather than a simple plugin. The company has also created a free tool, the Bitdefender AI Skills Checker, to help users quickly assess whether an AI skill is safe before installing it.





Source link