Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Credential Access appears in 2 case steps.
- 2Multiple attack methods. The case connects to 10 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The researcher performed targeting by searching for the title tag of ClawdBot’s web-based control interface, “Clawdbot Control” on Shodan, identifying hundreds of ClawdBot control interfaces exposed on the public internet.
-
Initial Access The researcher exploited a proxy misconfiguration present in ClawdBot’s control server to gain access to control interfaces that had authentication enabled.
-
Credential Access The researcher accessed credentials to a variety of services stored in plaintext in ClawdBot’s configuration file (
~/.clawdbot/clawdbot.json, which is visible in the ClawdBot dashboard. Across various exposed ClawdBot instances, they found: - Anthropic API Keys - Telegram Bot Tokens - Slack Oauth Credentials - Signal Device Linking URIs -
Execution
Step 4
Indirect
The researcher was able to prompt ClawdBot directly through the control interface.
-
Discovery
Step 5
System Prompt
The researcher prompted ClawdBot to
cat SOUL.md(the file containing ClawdBot’s system prompt), and it replied with its contents. -
Credential Access The researcher prompted ClawdBot with
envand it responded by invoking itsbashskill and executing theenvcommand, which contained additional secrets for other services. -
Privilege Escalation
Step 7
AI Agent Tool Invocation
The researcher prompted ClawdBot with
rootand it responded by invoking its ‘bash`skill logged in as the root user. -
Defense Evasion The researcher could have used the found Anthropic API Keys to manipulate the ClawdBot’s chat history with the user including deleting or modifying messages.
-
Exfiltration The researcher could have used the discovered application tokens to exfiltrate entire private conversation histories including shared files from any connected messaging apps (e.g. Telegram, Slack, Discord, Signal, WhatsApp, etc.).
-
Impact
Step 10
User Harm
The researcher could have used the discovered application tokens to cause further harms to the user, including impersonation by sending messages on the user’s behalf via any of the connected messaging apps.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.