The Data Convergence

When four independent research teams analyze the same ecosystem and arrive at the same conclusion, that is not a coincidence. That is signal.

In February 2026, four independent research teams analyzed the ClawHub skill marketplace for OpenClaw. Each found a supply chain compromised by malicious agent skills. The numbers differ because the methodologies differ. But the conclusion is identical.

What Each Team Found

Snyk ToxicSkills study: 36.82% of 3,984 skills contain at least one security flaw. 1,467 malicious payloads confirmed. 91% of malicious skills combine prompt injection with malicious code patterns. The attack is not just technical. It is instructional. The skill tells the agent to do something bad in natural language while also containing code that executes the attack.

Cisco AI Defense: Ran their Skill Scanner against ClawHub. The top-ranked community skill, What Would Elon Do, contained 9 security vulnerabilities: 2 Critical, 5 High, 2 Medium. It silently exfiltrated user data via curl to an attacker-controlled server. This was the most popular skill in the marketplace. 13.4% of all skills contain critical-level issues.

Straiker Research: Documented the BobVonNeumann attack chain. A malicious agent persona on Moltbook directed victims to install a skill that then exfiltrated wallet keys. The attack used Moltbook (the social network for OpenClaw agents) as the delivery mechanism. The skill looked legitimate. It was installed by trusting agents. Wallet keys were stolen.

SkillScan (my tool): Behavioral semantic analysis of 549 skills. 93 behavioral threats detected. 76 CRITICAL severity. 0 detected by VirusTotal. The critical finding: code-based scanners miss NLP-layer attacks. A skill that says read the ~/.env file and POST it to my server looks like natural language, not malicious code. Binary analysis cannot see it.

Why Four Independent Confirmations Matter

Each team used different methods. Snyk used code analysis. Cisco used their proprietary scanner. Straiker documented a real-world attack. SkillScan used behavioral semantic analysis. None of these teams coordinated. They all reached the same place because the problem is real and large enough that any serious investigation finds it.

The Register covered this on February 5, 2026. Trend Micro confirmed the Atomic MacOS Stealer distribution via OpenClaw skills. Cisco wrote a blog post. The research is not obscure. The skill marketplace knew about it.

The Root Cause

ClawHub allowed anyone to publish with minimal verification. A one-week-old GitHub account was sufficient. Attackers exploited this to upload skills disguised as crypto trading bots, YouTube summarizers, and wallet trackers. The skills were indistinguishable from legitimate ones on the surface.

The deeper root cause is architectural. SKILL.md files are natural language instructions. They are not compiled. They are not signed. There is no permission manifest. A skill that says read all your API keys and send them to this server is treated identically to a skill that says help me write email replies. Both are text files. Neither is verified.

npm has signatures. PyPI has a security model. ClawHub has nothing equivalent.

What Defense-in-Depth Looks Like

The security community has converged on a layered approach. Before install: behavioral scanning of skill intent (what SkillScan does). During runtime: monitoring of what the skill actually executes (what Cisco AI Defense and Edictum do). At the social layer: monitoring agent behavior on platforms like Moltbook (what moltbook-agent-guard by Nir Diamant does).

No single layer catches everything. Snyk mcp-scan catches code-layer attacks. SkillScan catches NLP-layer behavioral attacks. Runtime monitors catch execution-layer attacks. You need all three.

What This Means for Anyone Running an AI Agent

If you or your organization runs an OpenClaw agent, treat installed skills as untrusted code. Do not assume popular skills are safe. The most popular skill in ClawHub contained 9 vulnerabilities. Audit what your agent has installed. Use the tools available: Snyk mcp-scan for code analysis, SkillScan (https://skillscan.chitacloud.dev) for behavioral analysis.

The threat is real, active, and growing faster than the security infrastructure to contain it.