Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

Scheduled Pinned Locked Moved Uncategorized
openclawhypeinfosec
45 Posts 18 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rysiek@mstdn.socialR rysiek@mstdn.social

    There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

    Not any more!

    Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
    https://github.com/jgamblin/OpenClawCVEs/

    Bam! RCE by asking nicely.

    🧵

    #OpenClaw #AI #Hype #InfoSec

    rysiek@mstdn.socialR This user is from outside of this forum
    rysiek@mstdn.socialR This user is from outside of this forum
    rysiek@mstdn.social
    wrote last edited by
    #2

    OpenClaw treats this seriously, of course, and by seriously I mean claims this is normal, nothing to see here – and blames the users:
    https://openclawai.io/blog/openclaw-cve-flood-nine-vulnerabilities-four-days-march-2026

    > This four-day flood isn’t an anomaly. It’s what happens when a project grows from enthusiast tool to infrastructure faster than its security surface can mature.

    > If you’re running OpenClaw, you’re signing up to track upstream releases, apply patches promptly, and monitor advisories — indefinitely.

    🧵

    rysiek@mstdn.socialR purple@tech.lgbtP 2 Replies Last reply
    0
    • rysiek@mstdn.socialR rysiek@mstdn.social

      There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

      Not any more!

      Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
      https://github.com/jgamblin/OpenClawCVEs/

      Bam! RCE by asking nicely.

      🧵

      #OpenClaw #AI #Hype #InfoSec

      makdaam@chaos.socialM This user is from outside of this forum
      makdaam@chaos.socialM This user is from outside of this forum
      makdaam@chaos.social
      wrote last edited by
      #3

      @rysiek What's more it's not just one bot. It's a bot platform that can be driven by markdown files. Just make a useful "skill", wait for it to propagate, then add a few malicious sentences to it.
      People will pay for the tokens to send you their bitcoin wallets.
      Edit:
      This is by design, so even if OpenClaw is fully fixed and bug free the whole concept of it is based on trusting the content of all imported .md files forever.

      1 Reply Last reply
      0
      • rysiek@mstdn.socialR rysiek@mstdn.social

        OpenClaw treats this seriously, of course, and by seriously I mean claims this is normal, nothing to see here – and blames the users:
        https://openclawai.io/blog/openclaw-cve-flood-nine-vulnerabilities-four-days-march-2026

        > This four-day flood isn’t an anomaly. It’s what happens when a project grows from enthusiast tool to infrastructure faster than its security surface can mature.

        > If you’re running OpenClaw, you’re signing up to track upstream releases, apply patches promptly, and monitor advisories — indefinitely.

        🧵

        rysiek@mstdn.socialR This user is from outside of this forum
        rysiek@mstdn.socialR This user is from outside of this forum
        rysiek@mstdn.social
        wrote last edited by
        #4

        Do they mention any of this on their landing page? No, of course not:
        https://openclawai.io/

        Do they mention this on their quickstart page? No, of course not:
        https://openclawai.io/quickstart

        But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

        > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

        Security fuckup? More like business opportunity, amirite? 🤡

        🧵

        skyglobe@hostux.socialS rysiek@mstdn.socialR marcink@stolat.townM 3 Replies Last reply
        0
        • rysiek@mstdn.socialR rysiek@mstdn.social

          Do they mention any of this on their landing page? No, of course not:
          https://openclawai.io/

          Do they mention this on their quickstart page? No, of course not:
          https://openclawai.io/quickstart

          But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

          > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

          Security fuckup? More like business opportunity, amirite? 🤡

          🧵

          skyglobe@hostux.socialS This user is from outside of this forum
          skyglobe@hostux.socialS This user is from outside of this forum
          skyglobe@hostux.social
          wrote last edited by
          #5

          @rysiek just to add some LULz: https://days-since-openclaw-cve.com/

          rysiek@mstdn.socialR 1 Reply Last reply
          0
          • skyglobe@hostux.socialS skyglobe@hostux.social

            @rysiek just to add some LULz: https://days-since-openclaw-cve.com/

            rysiek@mstdn.socialR This user is from outside of this forum
            rysiek@mstdn.socialR This user is from outside of this forum
            rysiek@mstdn.social
            wrote last edited by
            #6

            @skyglobe kek.

            1 Reply Last reply
            0
            • rysiek@mstdn.socialR rysiek@mstdn.social

              There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

              Not any more!

              Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
              https://github.com/jgamblin/OpenClawCVEs/

              Bam! RCE by asking nicely.

              🧵

              #OpenClaw #AI #Hype #InfoSec

              c0dec0dec0de@hachyderm.ioC This user is from outside of this forum
              c0dec0dec0de@hachyderm.ioC This user is from outside of this forum
              c0dec0dec0de@hachyderm.io
              wrote last edited by
              #7

              @rysiek simultaneously the easiest and most expensive ever social engineering attempt ever

              rysiek@mstdn.socialR 1 Reply Last reply
              0
              • rysiek@mstdn.socialR rysiek@mstdn.social

                Do they mention any of this on their landing page? No, of course not:
                https://openclawai.io/

                Do they mention this on their quickstart page? No, of course not:
                https://openclawai.io/quickstart

                But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

                > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

                Security fuckup? More like business opportunity, amirite? 🤡

                🧵

                rysiek@mstdn.socialR This user is from outside of this forum
                rysiek@mstdn.socialR This user is from outside of this forum
                rysiek@mstdn.social
                wrote last edited by
                #8

                OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                And the way they hide behind the open source label is infuriating:

                > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                🧵

                #OpenClaw #AI

                rysiek@mstdn.socialR radex@social.hackerspace.plR delta_vee@cosocial.caD noplasticshower@infosec.exchangeN 4 Replies Last reply
                0
                • R relay@relay.publicsquare.global shared this topic
                • rysiek@mstdn.socialR rysiek@mstdn.social

                  OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                  Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                  And the way they hide behind the open source label is infuriating:

                  > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                  🧵

                  #OpenClaw #AI

                  rysiek@mstdn.socialR This user is from outside of this forum
                  rysiek@mstdn.socialR This user is from outside of this forum
                  rysiek@mstdn.social
                  wrote last edited by
                  #9

                  It is also entirely par for the course for the broader "AI" ecosystem, which has the same scammy vibes as the NFT space.

                  For years Microsoft had a line in Copilot's ToS (still does) insisting it is for entertainment purposes only (yet they push it in their products):
                  https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                  Anthropic's "extensively trained" model got tricked by a tactic used by a 13yo – "really, I'm a researcher!" and the company still does not see it as their responsibility:
                  https://rys.io/en/181.html#ai-orchestrated-cyberattack

                  🤡

                  🧵/end

                  davidgerard@circumstances.runD greatbigtable@mastodon.socialG 2 Replies Last reply
                  1
                  0
                  • rysiek@mstdn.socialR rysiek@mstdn.social

                    OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                    Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                    And the way they hide behind the open source label is infuriating:

                    > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                    🧵

                    #OpenClaw #AI

                    radex@social.hackerspace.plR This user is from outside of this forum
                    radex@social.hackerspace.plR This user is from outside of this forum
                    radex@social.hackerspace.pl
                    wrote last edited by
                    #10

                    @rysiek to a certain extent, I understand the attitude of “hey, this is just a hobby project, I made it for free, don’t expect *anything*”. I too dislike the entitled attitude of users of open source stuff.

                    *but* the moment this “toy project” became wildly popular, he should have taken down the website and put a big fat warning on GitHub to scare away people who are not experts (but have at least two brain cells). It’s this part that’s, as you said — utterly negligent.

                    rysiek@mstdn.socialR 1 Reply Last reply
                    0
                    • c0dec0dec0de@hachyderm.ioC c0dec0dec0de@hachyderm.io

                      @rysiek simultaneously the easiest and most expensive ever social engineering attempt ever

                      rysiek@mstdn.socialR This user is from outside of this forum
                      rysiek@mstdn.socialR This user is from outside of this forum
                      rysiek@mstdn.social
                      wrote last edited by
                      #11

                      @c0dec0dec0de I believe it's called "vibe-scamming"

                      1 Reply Last reply
                      0
                      • rysiek@mstdn.socialR rysiek@mstdn.social

                        OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                        Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                        And the way they hide behind the open source label is infuriating:

                        > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                        🧵

                        #OpenClaw #AI

                        delta_vee@cosocial.caD This user is from outside of this forum
                        delta_vee@cosocial.caD This user is from outside of this forum
                        delta_vee@cosocial.ca
                        wrote last edited by
                        #12

                        @rysiek "OpenClaw is utterly negligent" is sufficient there 😉

                        1 Reply Last reply
                        0
                        • radex@social.hackerspace.plR radex@social.hackerspace.pl

                          @rysiek to a certain extent, I understand the attitude of “hey, this is just a hobby project, I made it for free, don’t expect *anything*”. I too dislike the entitled attitude of users of open source stuff.

                          *but* the moment this “toy project” became wildly popular, he should have taken down the website and put a big fat warning on GitHub to scare away people who are not experts (but have at least two brain cells). It’s this part that’s, as you said — utterly negligent.

                          rysiek@mstdn.socialR This user is from outside of this forum
                          rysiek@mstdn.socialR This user is from outside of this forum
                          rysiek@mstdn.social
                          wrote last edited by
                          #13

                          @radex he promoted it from the get go in a way that invited regular non-techies to use it, without ever putting any kind of warning.

                          It was utterly negligent basically from the moment the website went up.

                          radex@social.hackerspace.plR 1 Reply Last reply
                          0
                          • rysiek@mstdn.socialR rysiek@mstdn.social

                            @radex he promoted it from the get go in a way that invited regular non-techies to use it, without ever putting any kind of warning.

                            It was utterly negligent basically from the moment the website went up.

                            radex@social.hackerspace.plR This user is from outside of this forum
                            radex@social.hackerspace.plR This user is from outside of this forum
                            radex@social.hackerspace.pl
                            wrote last edited by
                            #14

                            @rysiek Right, I haven't actually paid much attention, so I don't know. I'm just saying that in the culture where promoting/marketing hobby/open source projects is even a thing, I would forgive making that mistake initially - but I'd expect a quick reaction on first signs of popularity and/or pushback. (Which obviously *still* did not happen)

                            1 Reply Last reply
                            0
                            • rysiek@mstdn.socialR rysiek@mstdn.social

                              It is also entirely par for the course for the broader "AI" ecosystem, which has the same scammy vibes as the NFT space.

                              For years Microsoft had a line in Copilot's ToS (still does) insisting it is for entertainment purposes only (yet they push it in their products):
                              https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                              Anthropic's "extensively trained" model got tricked by a tactic used by a 13yo – "really, I'm a researcher!" and the company still does not see it as their responsibility:
                              https://rys.io/en/181.html#ai-orchestrated-cyberattack

                              🤡

                              🧵/end

                              davidgerard@circumstances.runD This user is from outside of this forum
                              davidgerard@circumstances.runD This user is from outside of this forum
                              davidgerard@circumstances.run
                              wrote last edited by
                              #15

                              @rysiek that line's been there since 2024 based on earlier terms since 2023, even the Reg covered it https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                              rysiek@mstdn.socialR 1 Reply Last reply
                              0
                              • rysiek@mstdn.socialR rysiek@mstdn.social

                                There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                                Not any more!

                                Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                                https://github.com/jgamblin/OpenClawCVEs/

                                Bam! RCE by asking nicely.

                                🧵

                                #OpenClaw #AI #Hype #InfoSec

                                jmax@mastodon.socialJ This user is from outside of this forum
                                jmax@mastodon.socialJ This user is from outside of this forum
                                jmax@mastodon.social
                                wrote last edited by
                                #16

                                @rysiek Yeah. Remember when "please forward this virus to your friends" was a dry joke?

                                rysiek@mstdn.socialR 1 Reply Last reply
                                0
                                • rysiek@mstdn.socialR rysiek@mstdn.social

                                  There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                                  Not any more!

                                  Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                                  https://github.com/jgamblin/OpenClawCVEs/

                                  Bam! RCE by asking nicely.

                                  🧵

                                  #OpenClaw #AI #Hype #InfoSec

                                  climbertobby@chaos.socialC This user is from outside of this forum
                                  climbertobby@chaos.socialC This user is from outside of this forum
                                  climbertobby@chaos.social
                                  wrote last edited by
                                  #17

                                  @rysiek 5 nines but for open CVEs instead of digits in percentage availability

                                  1 Reply Last reply
                                  0
                                  • davidgerard@circumstances.runD davidgerard@circumstances.run

                                    @rysiek that line's been there since 2024 based on earlier terms since 2023, even the Reg covered it https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                                    rysiek@mstdn.socialR This user is from outside of this forum
                                    rysiek@mstdn.socialR This user is from outside of this forum
                                    rysiek@mstdn.social
                                    wrote last edited by
                                    #18

                                    @davidgerard ah, sorry! Fixing. The broader point stands.

                                    davidgerard@circumstances.runD 1 Reply Last reply
                                    0
                                    • jmax@mastodon.socialJ jmax@mastodon.social

                                      @rysiek Yeah. Remember when "please forward this virus to your friends" was a dry joke?

                                      rysiek@mstdn.socialR This user is from outside of this forum
                                      rysiek@mstdn.socialR This user is from outside of this forum
                                      rysiek@mstdn.social
                                      wrote last edited by
                                      #19

                                      @jmax "and delete your files"

                                      1 Reply Last reply
                                      0
                                      • rysiek@mstdn.socialR rysiek@mstdn.social

                                        It is also entirely par for the course for the broader "AI" ecosystem, which has the same scammy vibes as the NFT space.

                                        For years Microsoft had a line in Copilot's ToS (still does) insisting it is for entertainment purposes only (yet they push it in their products):
                                        https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                                        Anthropic's "extensively trained" model got tricked by a tactic used by a 13yo – "really, I'm a researcher!" and the company still does not see it as their responsibility:
                                        https://rys.io/en/181.html#ai-orchestrated-cyberattack

                                        🤡

                                        🧵/end

                                        greatbigtable@mastodon.socialG This user is from outside of this forum
                                        greatbigtable@mastodon.socialG This user is from outside of this forum
                                        greatbigtable@mastodon.social
                                        wrote last edited by
                                        #20

                                        @rysiek considering the peeks into the leaked Claude Code, jailbreaking it this way is explicitly allowed in the code itself. If you tell it you are part of a security research team or on an authorized entertainment or doing a computer security assignment, it will let you do what you want.

                                        rysiek@mstdn.socialR 1 Reply Last reply
                                        0
                                        • greatbigtable@mastodon.socialG greatbigtable@mastodon.social

                                          @rysiek considering the peeks into the leaked Claude Code, jailbreaking it this way is explicitly allowed in the code itself. If you tell it you are part of a security research team or on an authorized entertainment or doing a computer security assignment, it will let you do what you want.

                                          rysiek@mstdn.socialR This user is from outside of this forum
                                          rysiek@mstdn.socialR This user is from outside of this forum
                                          rysiek@mstdn.social
                                          wrote last edited by
                                          #21

                                          @GreatBigTable interesting. I have not dove into Claude Code's spaghetti myself. Would love to hear more about this.

                                          wakame@tech.lgbtW 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups