ClawJacked WebSocket Flaw Lets Local OpenClaw AI Agents Be Hijacked

1 min read
Source: The Hacker News
ClawJacked WebSocket Flaw Lets Local OpenClaw AI Agents Be Hijacked
Photo: The Hacker News
TL;DR Summary

OpenClaw fixed a high-severity vulnerability, dubbed ClawJacked, that let a malicious website abuse a local WebSocket connection to a localhost OpenClaw gateway, brute-force its password, and auto-approve as a trusted device to gain full control over a locally running AI agent. A patch was released in version 2026.2.25 (Feb 26, 2026); users should update and audit access to AI agents. The story sits in a broader context of AI-agent attack surfaces, prior log-poisoning fixes (2026.2.13), related CVEs, and a surge in malicious skills on ClawHub, highlighting the need for isolation, governance, and vigilance against prompt injections.

Share this article

Reading Insights

Total Reads

1

Unique Readers

2

Time Saved

6 min

vs 7 min read

Condensed

92%

1,27996 words

Want the full story? Read the original article

Read on The Hacker News