Infostealer Malware Targets OpenClaw AI Secrets First Time


Infostealer malware stole OpenClaw AI agent configuration files for the first time on February 13, 2026. Hudson Rock found a live case where the malware grabbed API keys, tokens, and other secrets from the popular local AI framework. Attackers can now hijack AI agent identities.

OpenClaw runs on user machines with persistent memory. It handles tasks, emails, and cloud services. Its rise made it a prime target for stealers hunting high-value credentials.

The stolen files reveal emails, private keys, and agent behavior logs. This marks a shift from browser data to AI agent compromise.

Hudson Rock published the first detection. Their report states: “Hudson Rock has now detected a live infection where an infostealer successfully exfiltrated a victim’s OpenClaw configuration environment.” 

They predicted this attack last month. OpenClaw stores sensitive data in plain text files. Stealers scan for keywords like “token” and grab them automatically.

Alon Gal, Hudson Rock CTO, identified it as a Vidar variant. It uses broad file grabs, not OpenClaw-specific code.

Stolen OpenClaw Files

The malware took these key files from the .openclaw directory:

File NameContainsRisk
openclaw.jsonEmail, workspace path, gateway tokenRemote connections, impersonation
device.jsonPublic/private keys (Pem)Device signing, safe checks bypass
soul.mdAgent behavior definitionFull personality hijack
AGENTS.md, MEMORY.mdActivity logs, messages, calendarPersonal data exposure

These enable full digital identity takeover per Hudson Rock analysis.

Attack Evolution

Stealers evolved fast with AI tools. OpenClaw users face risks as it integrates into work flows. Expect targeted stealers soon.

Tenable found a related flaw in nanobot, an OpenClaw-inspired AI agent. CVE-2026-2577 allowed WhatsApp hijacks. Fixed in v0.13.post7

Nanobot hit 20k GitHub stars in weeks.

  • OpenClaw formerly ClawdBot/MoltBot.
  • Stores data locally with weak protection.
  • Global adoption spikes exposure.

Protection Steps

  • Move secrets to secure vaults.
  • Encrypt OpenClaw config files.
  • Scan for stealers regularly.
  • Limit AI agent cloud access.
  • Monitor for odd API activity.

FAQ

What did the infostealer grab from OpenClaw?

Config files with tokens, keys, emails, logs. 

Which malware hit OpenClaw first?

Vidar variant on Feb 13, 2026.

Is OpenClaw secure by default?

No, stores secrets in plain files scanned by stealers.

What related AI agent flaws exist?

Nanobot CVE-2026-2577 fixed

How to protect OpenClaw data?

Encrypt configs, use vaults, run AV scans.

Will more AI agents get targeted?

Yes, as adoption grows per Hudson Rock prediction.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages