ClawHub vulnerability made trust the attack surface
Silverfort says an exposed public Convex mutation let anyone fake ClawHub downloads, push a malicious skill to the top, and turn OpenClaw trust into a supply-chain risk.
The ClawHub bug mattered because it let an attacker manufacture the trust signal the marketplace was already teaching users and agents to believe.

Lead illustration
ClawHub vulnerability made trust the attack surfaceSilverfort's new ClawHub writeup lands on a problem that is both very current and uncomfortably old-fashioned. The company says it found a flaw in ClawHub, OpenClaw's public skills registry, that let anyone inflate a skill's download count through an exposed public Convex mutation, push that skill to the top of search results, and ride the resulting social proof into real installations.
In Silverfort's proof-of-concept, that was enough to get a malicious skill to the number-one slot in its category and then into about 3,900 executions over six days across more than 50 cities. That number comes from researcher telemetry, not from a confirmed criminal campaign. Even so, the point is hard to miss: the attack was not just "publish a bad package and hope." The attack was to tamper with the trust signal first.
That is why this story matters for OpenClaw users. A lot of supply-chain coverage treats distribution as background scenery. Here, distribution was the exploit path. The ClawHub bug turned a marketplace ranking signal into a mechanism for selection, installation, and execution. A leaderboard is a poor substitute for due diligence, especially when the leaderboard has a writable backend.
The bug was small in code and huge in consequence
Silverfort says ClawHub's normal download flow did include protections. The frontend path applied rate limiting, deduplication, and validation before a download was counted. If that had been the whole story, this would have been a much less interesting incident.
But it was not the whole story. In the open-source code, the researchers found a function called downloads:increment that was exposed as a public Convex mutation instead of an internal-only one. According to the report, that mistake left the function callable over the deployment URL with no authentication, no rate limit, no deduplication, and no permission checks. With a valid skillId and the deployment endpoint, an attacker could keep incrementing the counter and manufacture popularity on demand.
That kind of bug sounds almost boring. Unfortunately, boring bugs are often the ones that scale. There was no need for an elaborate chain full of exotic memory corruption and red-team fan fiction. The scorekeeping itself was open for editing.
Silverfort used the flaw to publish a proof-of-concept skill called "Outlook Graph Integration," presented as a normal productivity helper for scheduling and email tasks. Hidden inside was a low-impact exfiltration function that sent the client's username and fully qualified domain name back to a server under the researchers' control. Then came the important step: the team inflated the skill's download count until it rose to the top of its category.
Once that happened, the fake popularity started doing the persuasive work. Real users found the skill. Real executions followed. The company says it saw roughly 3,900 runs in six days. Again, that is Silverfort's telemetry from a controlled research exercise, not evidence that a criminal crew quietly ransacked thousands of machines. But it is more than enough to demonstrate the path from ranking manipulation to live execution.

Why this is more than a marketplace embarrassment
If ClawHub were just a passive catalog, the incident would still be ugly, but the blast radius would be narrower. OpenClaw makes the story sharper because the registry sits close to agent behavior. Users browse it directly, and agents can also search for skills and choose what looks best.
Silverfort says that when it asked an OpenClaw agent to find the right skill for email and calendar work, the agent chose the malicious package because it had the highest score. That score was influenced by the inflated download count. In other words, the same false social proof that could fool a human could also steer an autonomous selection flow.
That lands directly on the thesis we already made in our piece on ClawHub's distribution shift. Once the registry becomes part of the default install road, its ranking logic stops being cosmetic. It becomes part of the supply chain. The Silverfort incident is the dark mirror of platform leverage: the same convenience that makes a marketplace useful also concentrates trust in a few visible signals.
And download count is a particularly flimsy signal to put at the center of that loop. It is not provenance. It is not review. It is not code integrity. In this case it was not even reliable telemetry. It was just the number that happened to sit where users and agents were already looking.
That matters even more as OpenClaw gets easier to deploy and operationalize. A project that is pushing broader distribution through ClawHub, one-click surfaces, and surrounding ecosystem tooling is also pushing more trust decisions into install flows. That makes stories like Hostinger's OpenClaw hosting move and security layers like DefenseClaw feel less like side quests and more like the necessary plumbing around a growing agent platform.

The original flaw is fixed, but the lesson should stick
It is important to be precise here. Silverfort says it disclosed the issue on March 16, 2026, and that the ClawHub team mitigated it afterward. The report also says the OpenClaw team fixed the bug in under 24 hours, and it links to the relevant ClawHub commit. So this piece should not be read as "the public mutation is still sitting there waiting for abuse." The specific flaw described in the writeup has been remediated.
That does not make the incident a historical curiosity. It makes it a very fresh case study in how agent ecosystems fail when convenience metrics get treated like trust primitives. Silverfort's companion project, the ClawNet plugin, is useful as a defense-in-depth response because it scans skill installs for suspicious patterns before they proceed. But the first lesson is simpler than that: do not leave a public write path attached to the number everybody uses as proof.
There is also an architectural point here that reaches beyond OpenClaw. Convex's own guidance says public functions need explicit access control. RPC-first systems can be fast and pleasant to build, but they also make exposure mistakes unusually expensive. A helper that should have stayed internal can quietly become an internet-facing endpoint with real consequences. The code still looks tidy. The blast radius does not.
What to watch next in the OpenClaw ecosystem
The obvious near-term question is whether ClawHub changes how much weight download counts carry in ranking and recommendation flows. After this week, popularity metrics should probably be treated as one weak clue among many, not as the crown jewel of marketplace trust. Verified publishers, stronger provenance, clearer source pinning, and better explanation of why a skill was chosen all look more valuable now.
The broader question is whether agent ecosystems start acting like supply chains instead of hobby catalogs. That means not just scanners and after-the-fact plugins, but real control surfaces around install policy, execution privilege, and runtime enforcement. We have already seen that argument from different angles in pieces like NVIDIA OpenShell's agent security control plane and our look at open-source security funding shifting toward AI supply-chain defense. The ClawHub incident gives that argument a very practical example.
The odd part of this story is that the payload was not the clever bit. The clever bit, if you can call it that, was realizing the marketplace had already outsourced trust to a counter. Once that happened, the rest of the chain became much easier to script.
That is the takeaway worth keeping. The trust signal was the attack surface. Everything after that was just distribution doing what distribution does.
Public source trail
These links anchor the package to the underlying reporting trail. They are not a substitute for judgment, but they do show where the reporting starts.
Anchor source for the vulnerability mechanics, the exposed public Convex mutation, the proof-of-concept skill, the 3,900 executions claim, the March 16 disclosure date, and the statement that the issue has been mitigated.
Primary supporting evidence for the rapid remediation timeline referenced in Silverfort's writeup.
Useful context for why exposing a public mutation without explicit access control is a meaningful architectural mistake in an RPC-first backend.
Secondary confirmation that the disclosure was quickly picked up as a live OpenClaw ecosystem security story this week.

Talia Reed
Talia reports on product surfaces, developer tools, platform shifts, category shifts, and the distribution choices that determine whether AI features become durable workflows. She looks for the moment where a launch stops being a demo and becomes an ecosystem move.
- Published stories
- 17
- Latest story
- Mar 26, 2026
- Base
- New York
Reporting lens: Distribution is usually the story hiding inside the launch.. Signature: A feature matters when it changes someone else’s roadmap.



