112. GitHub OpenClaw Phishing Incident
Basic Information
| Item | Details |
|---|---|
| Incident Name | OpenClaw GitHub Phishing Attack |
| Discovery Time | March 2026 |
| Discoverer | OX Security |
| Target | OpenClaw GitHub Contributors and Followers |
| Phishing Domain | token-claw.xyz |
| C2 Server | watery-compost.today |
| Malicious File | eleven.js |
| CVE Number | Related Vulnerability CVE-2026-25253 (CVSS 8.8) |
Product Description
In March 2026, cybersecurity firm OX Security discovered a large-scale GitHub phishing attack targeting OpenClaw developers. The attackers created fake GitHub accounts and tagged followers of the OpenClaw project in Issues, claiming they had won $5,000 worth of CLAW tokens. Victims were directed to a phishing page that closely mimicked openclaw.ai, where their assets were stolen upon connecting their wallets. The incident was covered by major security and crypto media outlets such as CoinDesk, CSO Online, and Hackread.
Attack Details
Attack Process
- Create Fake Accounts: Attackers created disposable GitHub accounts.
- Open Issues: Opened Issue threads in repositories controlled by the attackers.
- Mass Tagging: Tagged dozens of OpenClaw stargazers.
- False Claims: Claimed recipients were selected to receive $5,000 CLAW tokens.
- Google Redirect: Redirected through Google links to token-claw.xyz.
- Phishing Page: A fake website closely mimicking openclaw.ai.
- Wallet Connection: Prompted to connect MetaMask, WalletConnect, or Trust Wallet.
- Asset Theft: Executed malicious transactions upon authorization.
Technical Details
- Malicious Code Location: eleven.js JavaScript file.
- Obfuscation Level: Highly obfuscated code.
- C2 Communication: Collected information via watery-compost.today.
- Phishing Domain: token-claw.xyz.
- Supported Wallets: MetaMask, WalletConnect, Trust Wallet.
Related Security Vulnerabilities
- CVE-2026-25253: CVSS score 8.8/10.
- Exposure: Over 42,000 exposed OpenClaw control panels across 82 countries.
- ClawJacked Vulnerability: Attackers could control AI agents via local WebSocket services.
Attack Timeline
| Time | Event |
|---|---|
| Late 2025 | Rug Pull during $CLAWD rebranding. |
| February 2026 | Disclosure of CVE-2026-25253 security vulnerability. |
| February 2026 | OpenClaw bans crypto discussions on Discord. |
| March 2026 | GitHub $CLAW phishing attack discovered. |
| Within hours | Malicious accounts deleted. |
Impact and Response
Direct Impact
- Malicious accounts deleted by GitHub within hours.
- No confirmed reports of stolen assets.
- However, attack activities continue to evolve.
OpenClaw Community Response
- GitHub Issue #49836 marked as a security warning.
- Sparked widespread discussion on Hacker News.
- OpenClaw official security announcement released.
- Community developed security skills like ClawShield.
Industry Impact
- Covered by major media outlets like CoinDesk, CSO Online, and Hackread.
- Sparked discussions on open-source project security.
- Prompted GitHub platform security improvements.
- Highlighted the importance of AI agent security.
Relationship with OpenClaw Ecosystem
The GitHub phishing incident was a significant catalyst for the development of OpenClaw's security ecosystem:
- Security Tool Development: Directly spurred the development of security scanning skills like ClawShield.
- Permission Framework: Reinforced the necessity for fine-grained permission delegation standards like ERC-7710.
- CoinFello Value: Demonstrated the value of CoinFello's "private keys never leave the device" approach.
- IronClaw Driver: Security incidents were one of the design motivations for IronClaw's four-layer defense architecture.
- Community Education: Raised security awareness across the entire OpenClaw community.
- Supply Chain Security: Exposed security risks in the AI agent skill supply chain.
References
External References
Learn more from these authoritative sources: