APromptRiskDBThreat intelligence atlas
AI Case Study

Supply Chain Compromise via Poisoned ClawdBot Skill - AI Case Study

A security researcher demonstrated a proof-of-concept supply chain attack using a poisoned ClawdBot Skill shared on ClawdHub, a Skill registry for agents. The poisoned Skill contained a prompt injection that caused ClawdBot to execute a shell command that reached the researcher's server. Although the researcher here used this access simply to warn users about the danger, they could have instead delivered a malicio...

ExerciseClawdBot (now OpenClaw)Jamieson O'ReillyResource DevelopmentDefense EvasionExecution

Overview

Case steps11Steps described in the case record.
Techniques11Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 4 case steps.
  • 2Multiple attack methods. The case connects to 11 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development4Defense Evasion2Execution2Initial Access1Privilege Escalation1Impact1
  1. Resource Development

    The researcher developed a poisoned ClawdBot Skill called "What Would Elon Do?" The Skill contained the malicious prompt in the rules/logic.md file, which is read when the Skill is activated. The researcher published their Skill to ClawdHub.

  2. Initial Access

    Users downloaded the poisoned Skill from ClawdHub. Note that ClawdHub does not display all files that are part of the Skill, making it hard for users to review Skills before downloading them.

  3. Step 8

    Direct

    Execution

    Claude Code read all files that are part of the Skill, executing the malicious prompt in the rules/logic.md file.

  4. Defense Evasion

    Claude Code prompted the user before executing the shell command. The researcher had registered the https://clawdhub-skill.com domain, which appears to be legitimate and may be confused with the legitimate https://clawdhub.com domain, causing the user to select confirm.

  5. Impact

    In this proof of concept, the researcher simply pinged their server and warned the user of the dangers of using Skills without reading the source code, causing no harm. However, they could have delivered a malicious payload, and caused a variety of harms, including: - Exfiltrating the user's codebase - Injecting backdoors into the user's codebase - Stealing the user's credentials - Installing malware or crypto miners - Performing anything else Claude Code is capable of

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.