Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

Scheduled Pinned Locked Moved Uncategorized
openclawhypeinfosec
45 Posts 18 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rysiek@mstdn.socialR rysiek@mstdn.social

    Do they mention any of this on their landing page? No, of course not:
    https://openclawai.io/

    Do they mention this on their quickstart page? No, of course not:
    https://openclawai.io/quickstart

    But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

    > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

    Security fuckup? More like business opportunity, amirite? 🤡

    🧵

    marcink@stolat.townM This user is from outside of this forum
    marcink@stolat.townM This user is from outside of this forum
    marcink@stolat.town
    wrote last edited by
    #32

    @rysiek I love how this landed right after the trive/litellm/axios thing where the take out is the exact opposite of “upgrade as soon as there is a new version”.

    rysiek@mstdn.socialR 1 Reply Last reply
    0
    • marcink@stolat.townM marcink@stolat.town

      @rysiek I love how this landed right after the trive/litellm/axios thing where the take out is the exact opposite of “upgrade as soon as there is a new version”.

      rysiek@mstdn.socialR This user is from outside of this forum
      rysiek@mstdn.socialR This user is from outside of this forum
      rysiek@mstdn.social
      wrote last edited by
      #33

      @marcink right?

      Don't worry, as soon as OpenClaw gets hit by supply-chain attack, which they inevitably are going to, this will flip.

      marcink@stolat.townM 1 Reply Last reply
      0
      • rysiek@mstdn.socialR rysiek@mstdn.social

        @GreatBigTable interesting. I have not dove into Claude Code's spaghetti myself. Would love to hear more about this.

        wakame@tech.lgbtW This user is from outside of this forum
        wakame@tech.lgbtW This user is from outside of this forum
        wakame@tech.lgbt
        wrote last edited by
        #34

        @rysiek @GreatBigTable

        I guess you have to ask really, really nicely, to counteract the other instruction. Or simply add a "system reminder".

        From a great and very enjoyable thread (for certain subcategories of "enjoyable"):

        Link Preview Image
        jonny (good kind) (@jonny@neuromatch.social)

        Attached: 3 images i love this. there's a mechanism to slip secret messages to the LLM that it is told to interpret as system messages. there is no validation around these of any kind on the client, and there doesn't seem to be any differentiation about location or where these things happen, so that seems like a nice prompt injection vector. this is how claude code reminds the LLM to not do a malware, and it's applied by just string concatenation. i can't find any place that gets stripped aside from when displaying output. it actually looks like all the system reminders get catted together before being send to the API. neat!

        favicon

        neurospace.live (neuromatch.social)

        rysiek@mstdn.socialR 1 Reply Last reply
        0
        • wakame@tech.lgbtW wakame@tech.lgbt

          @rysiek @GreatBigTable

          I guess you have to ask really, really nicely, to counteract the other instruction. Or simply add a "system reminder".

          From a great and very enjoyable thread (for certain subcategories of "enjoyable"):

          Link Preview Image
          jonny (good kind) (@jonny@neuromatch.social)

          Attached: 3 images i love this. there's a mechanism to slip secret messages to the LLM that it is told to interpret as system messages. there is no validation around these of any kind on the client, and there doesn't seem to be any differentiation about location or where these things happen, so that seems like a nice prompt injection vector. this is how claude code reminds the LLM to not do a malware, and it's applied by just string concatenation. i can't find any place that gets stripped aside from when displaying output. it actually looks like all the system reminders get catted together before being send to the API. neat!

          favicon

          neurospace.live (neuromatch.social)

          rysiek@mstdn.socialR This user is from outside of this forum
          rysiek@mstdn.socialR This user is from outside of this forum
          rysiek@mstdn.social
          wrote last edited by
          #35

          @wakame @GreatBigTable ah yes, I've seen that in fact

          greatbigtable@mastodon.socialG 1 Reply Last reply
          0
          • rysiek@mstdn.socialR rysiek@mstdn.social

            @wakame @GreatBigTable ah yes, I've seen that in fact

            greatbigtable@mastodon.socialG This user is from outside of this forum
            greatbigtable@mastodon.socialG This user is from outside of this forum
            greatbigtable@mastodon.social
            wrote last edited by
            #36

            @rysiek @wakame yeah. That one. So Anthropic's clutching of pearls over this happening is performative at best. They knew that this is possible because it is baked directly into the code. "You want to bypass these safe guards? Just say these magic words."

            rysiek@mstdn.socialR 1 Reply Last reply
            0
            • greatbigtable@mastodon.socialG greatbigtable@mastodon.social

              @rysiek @wakame yeah. That one. So Anthropic's clutching of pearls over this happening is performative at best. They knew that this is possible because it is baked directly into the code. "You want to bypass these safe guards? Just say these magic words."

              rysiek@mstdn.socialR This user is from outside of this forum
              rysiek@mstdn.socialR This user is from outside of this forum
              rysiek@mstdn.social
              wrote last edited by
              #37

              @GreatBigTable @wakame indeed, somehow I missed that initially. Thanks!

              1 Reply Last reply
              0
              • rysiek@mstdn.socialR rysiek@mstdn.social

                There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                Not any more!

                Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                https://github.com/jgamblin/OpenClawCVEs/

                Bam! RCE by asking nicely.

                🧵

                #OpenClaw #AI #Hype #InfoSec

                sloanlance@mastodon.socialS This user is from outside of this forum
                sloanlance@mastodon.socialS This user is from outside of this forum
                sloanlance@mastodon.social
                wrote last edited by
                #38

                @rysiek
                If I were ever interested in experimenting with that kind of thing (I'm not), I would only do it in a virtual machine. To do otherwise is foolish.

                rysiek@mstdn.socialR 1 Reply Last reply
                0
                • rysiek@mstdn.socialR rysiek@mstdn.social

                  OpenClaw treats this seriously, of course, and by seriously I mean claims this is normal, nothing to see here – and blames the users:
                  https://openclawai.io/blog/openclaw-cve-flood-nine-vulnerabilities-four-days-march-2026

                  > This four-day flood isn’t an anomaly. It’s what happens when a project grows from enthusiast tool to infrastructure faster than its security surface can mature.

                  > If you’re running OpenClaw, you’re signing up to track upstream releases, apply patches promptly, and monitor advisories — indefinitely.

                  🧵

                  purple@tech.lgbtP This user is from outside of this forum
                  purple@tech.lgbtP This user is from outside of this forum
                  purple@tech.lgbt
                  wrote last edited by
                  #39

                  @rysiek wow, they are so casual about authentication just not existing, I mean wow

                  1 Reply Last reply
                  0
                  • sloanlance@mastodon.socialS sloanlance@mastodon.social

                    @rysiek
                    If I were ever interested in experimenting with that kind of thing (I'm not), I would only do it in a virtual machine. To do otherwise is foolish.

                    rysiek@mstdn.socialR This user is from outside of this forum
                    rysiek@mstdn.socialR This user is from outside of this forum
                    rysiek@mstdn.social
                    wrote last edited by
                    #40

                    @sloanlance I really want to center OpenClaw's irresponsibility and negligence here though. They are actively promoting this to regular, non-techie people. And then when shit happens they blame the victim.

                    1 Reply Last reply
                    0
                    • rysiek@mstdn.socialR rysiek@mstdn.social

                      @marcink right?

                      Don't worry, as soon as OpenClaw gets hit by supply-chain attack, which they inevitably are going to, this will flip.

                      marcink@stolat.townM This user is from outside of this forum
                      marcink@stolat.townM This user is from outside of this forum
                      marcink@stolat.town
                      wrote last edited by
                      #41

                      @rysiek But between this being openclaw and the insufferably LLM-ish tone of the blog post (pictured below) we can at least rest assured that there is a chance that no human being had to be involved in writing, editing, or reviewing these.

                      rysiek@mstdn.socialR 1 Reply Last reply
                      0
                      • marcink@stolat.townM marcink@stolat.town

                        @rysiek But between this being openclaw and the insufferably LLM-ish tone of the blog post (pictured below) we can at least rest assured that there is a chance that no human being had to be involved in writing, editing, or reviewing these.

                        rysiek@mstdn.socialR This user is from outside of this forum
                        rysiek@mstdn.socialR This user is from outside of this forum
                        rysiek@mstdn.social
                        wrote last edited by
                        #42

                        @marcink what a fantastic scene in that film.

                        marcink@stolat.townM 1 Reply Last reply
                        0
                        • rysiek@mstdn.socialR rysiek@mstdn.social

                          @marcink what a fantastic scene in that film.

                          marcink@stolat.townM This user is from outside of this forum
                          marcink@stolat.townM This user is from outside of this forum
                          marcink@stolat.town
                          wrote last edited by
                          #43

                          @rysiek If there is any silver lining to this LLM bubble is that it will provide way more than enough material for a sequel.

                          1 Reply Last reply
                          0
                          • rysiek@mstdn.socialR rysiek@mstdn.social

                            There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                            Not any more!

                            Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                            https://github.com/jgamblin/OpenClawCVEs/

                            Bam! RCE by asking nicely.

                            🧵

                            #OpenClaw #AI #Hype #InfoSec

                            fds@mastodon.socialF This user is from outside of this forum
                            fds@mastodon.socialF This user is from outside of this forum
                            fds@mastodon.social
                            wrote last edited by
                            #44

                            @rysiek it’s a shame we still act like people are doing great things when they publish stuff like this.

                            rysiek@mstdn.socialR 1 Reply Last reply
                            0
                            • fds@mastodon.socialF fds@mastodon.social

                              @rysiek it’s a shame we still act like people are doing great things when they publish stuff like this.

                              rysiek@mstdn.socialR This user is from outside of this forum
                              rysiek@mstdn.socialR This user is from outside of this forum
                              rysiek@mstdn.social
                              wrote last edited by
                              #45

                              @fds 💯

                              (assuming "stuff like this" is OpenClaw, not the openClawCVEs repo)

                              1 Reply Last reply
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups