There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.
-
@marcink right?
Don't worry, as soon as OpenClaw gets hit by supply-chain attack, which they inevitably are going to, this will flip.
@rysiek But between this being openclaw and the insufferably LLM-ish tone of the blog post (pictured below) we can at least rest assured that there is a chance that no human being had to be involved in writing, editing, or reviewing these.
-
@rysiek But between this being openclaw and the insufferably LLM-ish tone of the blog post (pictured below) we can at least rest assured that there is a chance that no human being had to be involved in writing, editing, or reviewing these.
@marcink what a fantastic scene in that film.
-
@marcink what a fantastic scene in that film.
@rysiek If there is any silver lining to this LLM bubble is that it will provide way more than enough material for a sequel.
-
There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.
Not any more!
Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
https://github.com/jgamblin/OpenClawCVEs/Bam! RCE by asking nicely.
🧵
@rysiek it’s a shame we still act like people are doing great things when they publish stuff like this.
-
@rysiek it’s a shame we still act like people are doing great things when they publish stuff like this.
(assuming "stuff like this" is OpenClaw, not the openClawCVEs repo)
-
R relay@relay.infosec.exchange shared this topic