Researchers discovered 1,184 malicious skills on ClawHub — OpenClaw's community skill marketplace — disguised as crypto trading tools, productivity plugins, and utility integrations. The campaign, dubbed ClawHavoc, deployed info-stealers, crypto wallet drainers, and persistent backdoors on the machines of users who installed them.

Separately, a Snyk scan of 3,984 skills across ClawHub and skills.sh found 534 (13.4%) with critical-severity vulnerabilities, and 76 confirmed malicious payloads.

This is a supply chain attack problem. OpenClaw skills run with the same permissions as OpenClaw itself — which on most setups means shell execution, file system access, and access to whatever channels you've connected. A malicious skill can read your files, exfiltrate your API keys, and persist across reboots.

Current status: ClawHub has removed the confirmed malicious skills from the ClawHavoc campaign. However, skills that haven't been reported may still be present, and new malicious skills continue to be submitted. The audit habits below protect you regardless of which skills are currently flagged.

Red Flags — Reasons to Reject a Skill Immediately

Green Flags — Signs a Skill Is Trustworthy

The Skill Audit Process (5 Minutes Per Skill)

How to Remove a Skill You're Unsure About

# List installed skills
openclaw skills list

# Remove a specific skill
openclaw skills remove [skill-name]

# Verify removal
ls ~/.openclaw/skills/

After removing, restart the gateway to ensure the skill is fully unloaded:

openclaw gateway restart

If you installed a skill from the ClawHavoc period (before April 2026) and haven't audited it: treat it as potentially compromised. Remove it, rotate any API keys the skill had access to, and review your agent logs for unusual exec or network activity.

Skills That Are Always Safe

One category of skills carries essentially zero risk: pure SKILL.md skills with no dependencies. These are plain text instruction files — they tell the LLM how to behave, reference no external resources, and have no executable code. They cannot exfiltrate data or install backdoors.

The official skills that ship with OpenClaw, plus well-known community skills like the weather skill, calendar integrations, and the ClawReady skills we publish, fall into this category. If you want to limit your attack surface, prioritize pure-markdown skills over anything with an npm dependency tree.

Policy recommendation: Treat ClawHub skills like browser extensions — install only what you actually need, from authors you can verify. The functionality gain from a random skill is rarely worth the risk of a compromised machine.