Slowmist: ClawHub Memiliki Risiko Penanaman Pintu Belakang, 21% Top 100 Skills Terdaftar Sebagai Berisiko Tinggi

MarketWhisper

ClawHub存在後門植入風險

Chief Information Security Officer of Slow Mist Technology 23pds Public Warning: Due to ClawHub relying on GitHub one-click login, developer credentials stolen by worms may be used to impersonate developers and release malicious Skills, launching supply chain attacks. Meanwhile, GoPlus has completed comprehensive security scans on the top 100 Skills with the highest download volumes from ClawHub, revealing 21% high risk and 17% requiring warnings.

Full Analysis of Attack Path: From GitHub Credentials to System Intrusion

Slow Mist clearly outlines the complete attack chain in their announcement to help developers and users understand the actual threat mechanism:

Credential Theft: Worms like Sha1-Hulud or phishing attacks steal developers’ GitHub login credentials

Gaining GitHub Access: Attackers use stolen credentials to log into victims’ GitHub accounts

Impersonating Developers to Log into ClawHub: Since ClawHub uses GitHub one-click authorization, attackers can directly access the platform as legitimate developers

Releasing Malicious Skills: Under the guise of legitimate developers, malicious Skills containing backdoors are uploaded, making them hard to distinguish from normal Skills

User Installation and Execution: Unaware users download and run these Skills, triggering malicious code

System Intrusion: Attackers gain access to user devices, potentially leading to data theft, remote control, and serious consequences

The danger of this attack chain lies in its high concealment at each stage, making it nearly impossible for users to identify whether a Skill has been maliciously tampered with just by appearance.

GoPlus Scan Results: Security Distribution Among Top 100 Skills

On March 12, GoPlus released a security scan report on the top 100 Skills with the highest download frequency from ClawHub, providing more systematic risk quantification data:

21% Blocked: These Skills exhibit clear high-risk operations, including direct network penetration, sensitive API calls, and automatic message sending

17% Warning: These Skills pose potential risks; users with higher security requirements are advised to exercise caution

62% Passed: The remaining Skills showed no obvious issues under current scan parameters

GoPlus recommends that for Skills with high-risk operations, a “Human-in-the-Loop (HITL)” manual confirmation mechanism should be enforced, allowing human review before critical operations are executed, rather than remedial actions after the fact.

Tencent SkillHub Controversy: Large-Scale Scraping Raises Copyright and Support Issues

Amid rising security warnings, the ClawHub ecosystem has also sparked another discussion due to Tencent’s approach. Tencent launched a SkillHub community built on the open-source ecosystem of OpenClaw, positioning it as a localized Skills distribution platform for Chinese developers. However, OpenClaw founder Peter Steinberger criticized this after learning about it, stating he received complaints that Tencent scraped all Skills from ClawHub and integrated them into their platform, with such rapid speed that it triggered official rate limits. Steinberger openly said: “They copied, but did not support this project.”

Tencent AI responded, explaining that SkillHub operates as a mirror site, with the original source marked as ClawHub, and stated that the platform aims to provide a more stable and faster access experience for Chinese users. In its first week online, it handled about 180GB of download traffic (870,000 downloads), but only about 1GB was actually pulled from official sources. Tencent emphasized that multiple team members have contributed code to related open-source projects and hopes to continue supporting the ecosystem development.

Frequently Asked Questions

How should ClawHub users protect themselves from malicious Skills?

It is recommended to: prioritize installing Skills reviewed by security agencies like GoPlus; be cautious with Skills requesting access to local files, network, or system APIs; monitor download counts and reviews but do not rely solely on them for safety; regularly update Skills and pay attention to platform security notices. Most importantly, enable “Human-in-the-Loop (HITL)” confirmation before executing high-risk operations.

Should ClawHub switch from GitHub login to other authentication methods?

From a security architecture perspective, relying on a single OAuth provider (like GitHub) creates a single point of failure—if GitHub credentials are compromised, ClawHub accounts are at risk. More secure options include: implementing multi-factor authentication (MFA), allowing independent account creation, or adding extra human or machine verification layers for Skill publishing. These are directions for platform developers to improve trust mechanisms.

Does Tencent SkillHub’s approach violate open-source licenses?

This depends on the specific licensing terms of OpenClaw and ClawHub. Using mirror sites and marking original sources as fair use is generally acceptable, but Steinberger’s criticism points more to ethical issues—using community-built results without substantial contribution or commercial support. Such disputes are common in open-source communities and are usually resolved through clearer licensing and commercial agreements.

Penafian: Informasi di halaman ini dapat berasal dari pihak ketiga dan tidak mewakili pandangan atau opini Gate. Konten yang ditampilkan hanya untuk tujuan referensi dan bukan merupakan nasihat keuangan, investasi, atau hukum. Gate tidak menjamin keakuratan maupun kelengkapan informasi dan tidak bertanggung jawab atas kerugian apa pun yang timbul akibat penggunaan informasi ini. Investasi aset virtual memiliki risiko tinggi dan rentan terhadap volatilitas harga yang signifikan. Anda dapat kehilangan seluruh modal yang diinvestasikan. Harap pahami sepenuhnya risiko yang terkait dan buat keputusan secara bijak berdasarkan kondisi keuangan serta toleransi risiko Anda sendiri. Untuk detail lebih lanjut, silakan merujuk ke Penafian.

Artikel Terkait

Gedung Putih Menetapkan Batas Waktu 4 Juli untuk RUU Regulasi Kripto

Patrick Witt, direktur eksekutif Dewan Penasihat Presiden untuk Aset Digital, mengumumkan target tanggal 4 Juli untuk mengesahkan undang-undang kripto yang komprehensif menjadi undang-undang, saat berbicara pada Rabu di konferensi Consensus di Miami. Witt menyatakan Senat dapat memajukan RUU tersebut pada Juni, sehingga tersisa tim

CryptoFrontier2jam yang lalu

Seorang pria California, Marlon Ferro, ditangkap karena mencuri dompet dingin senilai 250 juta dolar AS dan divonis 78 bulan

Berdasarkan pernyataan resmi Departemen Kehakiman AS (DOJ) yang dirilis pada 7 Mei, seorang pria asal California berusia 20 tahun, Marlon Ferro, dijatuhi hukuman 78 bulan penjara karena terlibat dalam skema penipuan rekayasa sosial berbasis aset kripto yang menjangkau seluruh negeri. Ia juga dijatuhi 3 tahun pelepasan bersyarat dengan pengawasan serta denda ganti rugi sebesar 2,5 juta dolar AS. Menurut pernyataan DOJ, kelompok kriminal tersebut mencuri lebih dari 250 juta dolar AS aset kripto dari sejumlah korban.

MarketWhisper4jam yang lalu

1inch market maker TrustedVolumes diserang, kerugian mencapai 5,87 juta dolar AS

Perusahaan keamanan blockchain Blockaid pada 6 Mei pukul 5:00 sore waktu Timur AS memposting di X untuk mengungkap bahwa penyedia likuiditas dan market maker TrustedVolumes untuk pengagregator decentralized exchange 1inch sedang mengalami serangan berkelanjutan. Hingga saat pernyataan Blockaid dirilis, kerugian telah mencapai sekitar 5,87 juta dolar AS.

MarketWhisper4jam yang lalu

Aave mencairkan posisi penyerang Kelp DAO, pemungutan suara Arbitrum menyetujui pembekuan kembali rsETH

Berdasarkan pengumuman Aave pada 7 Mei, pemungutan suara Arbitrum DAO terkait pembekuan dana terkait peristiwa rsETH pada 18 April telah mencapai kuorum, dengan lebih dari 1.600 alamat, dan memperoleh dukungan penuh dari komunitas. Pada hari yang sama, Aave, sesuai dengan prosedur tata kelola yang telah ditetapkan, menyelesaikan likuidasi sisa posisi rsETH pada protokol Aave terhadap penyerang Kelp DAO.

MarketWhisper4jam yang lalu

1inch Liquidity Provider TrustedVolumes Diserang di Ethereum, $5,87 Juta Dicuri

Menurut Blockaid, pembuat pasar dan resolver 1inch, TrustedVolumes, sedang diserang di Ethereum per 7 Mei. Kerentanan terdeteksi dalam sistem pemantauan keamanan Blockaid di dalam kontrak agen perdagangan custom RFQ yang dikendalikan oleh TrustedVolumes. Para penyerang telah mengekstrak

GateNews5jam yang lalu

Project Eleven memperingatkan: 6,9 juta BTC menghadapi ancaman kuantum, Q-Day paling cepat pada tahun 2030

Perusahaan rintisan keamanan pasca-kuantum Project Eleven pada 6 Mei merilis laporan yang memperingatkan bahwa terobosan komputer kuantum melewati titik kritis (Q-Day) untuk teknologi kripto modern kemungkinan paling cepat terjadi pada 2030, dan probabilitasnya lebih dari 50% pada 2033. Laporan tersebut juga memperkirakan bahwa, dengan kondisi tertentu, sekitar 6,9 juta keping Bitcoin menghadapi risiko serangan kuantum yang potensial, serta menyerukan ekosistem mata uang kripto untuk mempercepat proses migrasi anti-kuantum.

MarketWhisper6jam yang lalu
Komentar
0/400
Tidak ada komentar