{"id":4689,"date":"2026-03-03T06:44:36","date_gmt":"2026-03-03T06:44:36","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2026\/03\/03\/clawjacked-bug-enables-covert-ai-agent-hijacking\/"},"modified":"2026-03-03T06:44:36","modified_gmt":"2026-03-03T06:44:36","slug":"clawjacked-bug-enables-covert-ai-agent-hijacking","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/03\/03\/clawjacked-bug-enables-covert-ai-agent-hijacking\/","title":{"rendered":"ClawJacked Bug Enables Covert AI Agent Hijacking"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>OpenClaw users have been urged to upgrade to the latest version of the tool after researchers revealed how an indirect prompt injection attack could give adversaries full remote control.<\/p>\n<p>The \u201cClawJacked\u201d bug is a high-severity issue in the popular AI assistant platform.<\/p>\n<p>\u201cAt its core, OpenClaw runs a gateway, a local WebSocket server that acts as the brain of the operation. The gateway handles authentication, manages chat sessions, stores configuration\u00a0and orchestrates the AI agent,\u201d Oasis Security explained.<\/p>\n<p>\u201cConnected to the gateway are nodes \u2013 these can be the macOS companion app, an iOS device, or other machines. Nodes register with the gateway and expose capabilities, running system commands, accessing the camera, reading contacts and more. The gateway can dispatch commands to any connected node.\u201d<\/p>\n<p>The problem is that the gateway binds to localhost by default, because it assumes that local access is inherently trusted. However, if a user visits a malicious site, this assumption breaks down.<\/p>\n<p>The report explained that an attack could look like this:<\/p>\n<ol>\n<li><strong>JavaScript on the page opens a WebSocket connection to localhost<\/strong>\u00a0on the OpenClaw gateway port. This is permitted because WebSocket connections to localhost are not blocked by cross-origin policies<\/li>\n<li><strong>The script brute-forces the gateway password<\/strong>\u00a0at hundreds of attempts per second. The gateway&#8217;s rate limiter exempts localhost connections entirely<\/li>\n<li><strong>Once authenticated, the script silently registers as a trusted device.<\/strong>\u00a0The gateway auto-approves device pairings from localhost with no user prompt<\/li>\n<\/ol>\n<p>One these steps have been achieved, the attacker has full control over the OpenClaw instance \u2013 enabling them to interact with the agent, dump configuration data, enumerate connected devices\u00a0and read logs, Oasis Security warned.<\/p>\n<p><em>Read more on OpenClaw: Researchers Find 40,000+ Exposed OpenClaw Instances.<\/em><\/p>\n<h2><strong>Users Urged to Update OpenClaw<\/strong><\/h2>\n<p>The research team urged OpenClaw users to upgrade to version 2026.2.25 or later immediately, praising the volunteers that manage the open source project for their swift fix.<\/p>\n<p>However, this is just one of many OpenClaw security scares to surface over recent weeks. Numerous vulnerabilities and hundreds of malicious add-ons (\u201cskills\u201d) have been discovered in the platform ecosystem, and infostealers are known to be targeting the popular AI tool.<\/p>\n<p>Oasis Security recommended organizations:<\/p>\n<ul>\n<li>Gain visibility into all of their AI usage by inventorying which agents and assistants are running across developer environments<\/li>\n<li>Update all OpenClaw instances immediately to the latest version<\/li>\n<li>Review access rights granted to AI agents and revoke anything that isn\u2019t actively required<\/li>\n<li>Establish governance strategy for non-human identities based around intent analysis, policy enforcement, just-in-time access and a full audit trail \u201cfrom human to agent to action\u201d<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>OpenClaw users have been urged to upgrade to the latest version of the tool after researchers revealed how an indirect prompt injection attack could give adversaries full remote control. The \u201cClawJacked\u201d bug is a high-severity issue in the popular AI assistant platform. \u201cAt its core, OpenClaw runs a gateway, a local WebSocket server that acts<\/p>\n","protected":false},"author":2,"featured_media":4690,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4689-d0c7ca08-93e3-4374-acf2-2f656c637c67-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4689"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4689\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4690"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}