APromptRiskDBThreat intelligence atlas
AI Case Study

Exposed ClawdBot Control Interfaces Leads to Credential Access and Execution - AI Case Study

A security researcher identified hundreds of exposed ClawdBot control interfaces on the public internet. ClawdBot (now OpenClaw) “is a personal AI assistant you run on your own devices. It answers you on the channels you already use … , plus extension channels. … It can speak and listen on macOS/iOS/Android, and can render a live Canvas you control.”[<sup>\[1\]</sup>][1] The researcher was able to access credentia...

ExerciseClawdBot (now OpenClaw)Jamieson O’ReillyCredential AccessReconnaissanceInitial Access

Overview

Case steps10Steps described in the case record.
Techniques10Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Credential Access appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 10 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Credential Access2Reconnaissance1Initial Access1Execution1Discovery1Privilege Escalation1Defense Evasion1Exfiltration1Impact1
  1. Reconnaissance

    The researcher performed targeting by searching for the title tag of ClawdBot’s web-based control interface, “Clawdbot Control” on Shodan, identifying hundreds of ClawdBot control interfaces exposed on the public internet.

  2. Credential Access

    The researcher accessed credentials to a variety of services stored in plaintext in ClawdBot’s configuration file (~/.clawdbot/clawdbot.json, which is visible in the ClawdBot dashboard. Across various exposed ClawdBot instances, they found: - Anthropic API Keys - Telegram Bot Tokens - Slack Oauth Credentials - Signal Device Linking URIs

  3. Step 4

    Indirect

    Execution

    The researcher was able to prompt ClawdBot directly through the control interface.

  4. Discovery

    The researcher prompted ClawdBot to cat SOUL.md (the file containing ClawdBot’s system prompt), and it replied with its contents.

  5. Exfiltration

    The researcher could have used the discovered application tokens to exfiltrate entire private conversation histories including shared files from any connected messaging apps (e.g. Telegram, Slack, Discord, Signal, WhatsApp, etc.).

  6. Step 10

    User Harm

    Impact

    The researcher could have used the discovered application tokens to cause further harms to the user, including impersonation by sending messages on the user’s behalf via any of the connected messaging apps.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.