OpenClaw adds VirusTotal scanning to block malicious ClawHub skills


OpenClaw

OpenClaw has started scanning every skill published to ClawHub with VirusTotal, including VirusTotal’s “Code Insight” analysis. Skills that get a benign verdict can be auto-approved, suspicious ones are shown with a warning, and anything marked malicious is blocked from download. OpenClaw also says it re-scans active skills daily to catch skills that turn bad after an update.

According to Google-backed VirusTotal, this move comes after researchers and incident writeups showed that attackers were using “skills” as a delivery mechanism for malware, often by publishing a harmless-looking skill that tells users to download and run something else during “setup.”

OpenClaw’s goal here is simple: reduce supply-chain risk in the skill marketplace without waiting for every user to manually audit every skill folder.

What changed in ClawHub?

When a developer publishes a skill, OpenClaw now packages it in a deterministic ZIP, hashes it, and uses that fingerprint to look it up in VirusTotal.

Clawhub

If VirusTotal does not already have results (or does not have a Code Insight verdict), ClawHub uploads the bundle for scanning and LLM-based analysis.

ClawHub scanning flow

StepWhat happensWhy it matters
Deterministic packagingSkill files are bundled into a ZIP with consistent compression and timestamps, plus a _meta.jsonMakes hashing stable and repeatable
SHA-256 hashClawHub computes a SHA-256 for the bundleCreates a unique fingerprint for lookup
VirusTotal lookupHash is checked against VirusTotalFast results when already known
Upload for analysisIf not found, bundle is uploaded via VirusTotal API for scanningCatches new or modified bundles
Code Insight reviewCode Insight analyzes the full skill package starting from SKILL.md and referenced resourcesLooks for risky behavior patterns, not just signatures
Verdict appliedBenign = approved, suspicious = warning, malicious = blockedGives users a clear signal
Daily re-scansActive skills are re-scanned dailyHelps catch “clean today, bad tomorrow” cases

What VirusTotal “Code Insight” is actually looking at

Traditional malware scanning can miss “documentation-only” skills that do not contain a payload, but still convince users to run one. Code Insight is meant to summarize what a skill does from a security point of view, including behaviors implied by the skill’s instructions and scripts.

OpenClaw-VirusTotal

VirusTotal says it added native support for OpenClaw skill packages, and that it analyzes from SKILL.md outward, including referenced scripts and resources.

Code Insight commonly flags patterns like these:

  • Downloading and executing remote code (curl/wget, PowerShell download cradles, installers)
  • Obfuscated scripts (Base64 blobs, heavy string building, packed binaries)
  • Access to sensitive locations (credential stores, browser profiles, SSH keys, API key files)
  • Network operations that look like beacons or exfiltration
  • Instructions that try to bypass user review (run this first, paste this command, disable security)

VirusTotal and OpenClaw partnership comes at the right moment

In a February 1, 2026 audit, Koi Security says it reviewed all 2,857 skills on ClawHub and found 341 malicious skills, with 335 linked to one large campaign it called “ClawHavoc.” Their writeup shows a repeated pattern: a skill looks legitimate, but the prerequisites instruct users to download a ZIP (sometimes with a password) or run a script hosted on a paste site.

Separately, VirusTotal’s own analysis says Code Insight had already analyzed more than 3,016 OpenClaw skills, and “hundreds” showed malicious characteristics, ranging from insecure coding to clearly malicious intent.

This is why OpenClaw chose an approach that covers the full marketplace workflow, not just manual reporting: hashing, automated scanning, behavior summarization, and repeat checks after publication.

OpenClaw-VirusTool integration is still not perfect for cybersecurity, as AI is changing rapidly

OpenClaw is also blunt that VirusTotal scanning is not perfect, especially when the “attack” is mostly language-based manipulation or cleverly hidden prompt injection.

Threat typeWill VirusTotal scanning help?Notes
Known malware in a bundleOften yesSignature and reputation checks work well here
Skills that bundle droppers or suspicious binariesOften yesCode Insight can surface risky behavior clues
Skills that mainly social-engineer users to run external codeSometimesDepends on what the instructions and referenced scripts reveal
Prompt injection payloads hidden in content the agent reads laterNot reliablyOpenClaw explicitly calls this out as a gap
Zero-days in OpenClaw itselfNot directlyThis is marketplace hygiene, not platform hardening

What you should do right now

VirusTotal signals are useful, but your real safety comes from how you run the agent and how you treat skills.

If you are an end user

  • Prefer skills from publishers you already trust, even if a new skill shows “benign.”
  • Treat any skill that asks you to run a downloaded binary or paste a terminal command as high risk.
  • Run OpenClaw with least privilege where possible, and keep it away from credential stores and personal folders unless you truly need that access.
  • If the platform offers sandboxing options, use them for third-party skills (especially ones that touch files or run commands)

If you publish skills

  • Expect false positives and review any warnings quickly. OpenClaw says you can contact them if something is incorrectly flagged.
  • Avoid “setup steps” that require remote execution. If you need dependencies, document them clearly and prefer package-managed installs with integrity checks.
  • Make risky actions explicit in your docs (network access, file reads, token usage).

If you are a security or IT team

  • Treat agent skills like a new class of marketplace software, similar to browser extensions and developer plugins.
  • Watch for employees running agents with broad permissions outside IT visibility (shadow AI risk).
  • Add controls around skill installation, outbound network access from agents, and secret storage on endpoints.

FAQ

Does this mean ClawHub is “safe” now?

It is safer than an unscanned marketplace, but it is not guaranteed safe. OpenClaw itself says scanning is one layer, and prompt injection can still bypass typical malware checks.

What exactly gets auto-blocked?

Skills that VirusTotal scanning marks as malicious are blocked from download. Benign can be approved, and suspicious can stay up with a warning label.

How fast can a malicious update be caught?

OpenClaw says active skills are re-scanned daily, which helps catch skills that change after initial publication.

Why do “skills” make this worse than normal plugins?

Because skills often sit next to an agent that can execute commands, read files, and act across services. If you install a bad skill, the blast radius can be your whole workflow, not just a single app feature.



Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages