Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
openclawhypeinfosec
47 Indlæg 19 Posters 0 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • rysiek@mstdn.socialR This user is from outside of this forum
    rysiek@mstdn.socialR This user is from outside of this forum
    rysiek@mstdn.social
    wrote sidst redigeret af
    #1

    There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

    Not any more!

    Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
    https://github.com/jgamblin/OpenClawCVEs/

    Bam! RCE by asking nicely.

    🧵

    #OpenClaw #AI #Hype #InfoSec

    rysiek@mstdn.socialR makdaam@chaos.socialM c0dec0dec0de@hachyderm.ioC jmax@mastodon.socialJ climbertobby@chaos.socialC 9 Replies Last reply
    1
    0
    • rysiek@mstdn.socialR rysiek@mstdn.social

      There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

      Not any more!

      Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
      https://github.com/jgamblin/OpenClawCVEs/

      Bam! RCE by asking nicely.

      🧵

      #OpenClaw #AI #Hype #InfoSec

      rysiek@mstdn.socialR This user is from outside of this forum
      rysiek@mstdn.socialR This user is from outside of this forum
      rysiek@mstdn.social
      wrote sidst redigeret af
      #2

      OpenClaw treats this seriously, of course, and by seriously I mean claims this is normal, nothing to see here – and blames the users:
      https://openclawai.io/blog/openclaw-cve-flood-nine-vulnerabilities-four-days-march-2026

      > This four-day flood isn’t an anomaly. It’s what happens when a project grows from enthusiast tool to infrastructure faster than its security surface can mature.

      > If you’re running OpenClaw, you’re signing up to track upstream releases, apply patches promptly, and monitor advisories — indefinitely.

      🧵

      rysiek@mstdn.socialR purple@tech.lgbtP 2 Replies Last reply
      0
      • rysiek@mstdn.socialR rysiek@mstdn.social

        There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

        Not any more!

        Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
        https://github.com/jgamblin/OpenClawCVEs/

        Bam! RCE by asking nicely.

        🧵

        #OpenClaw #AI #Hype #InfoSec

        makdaam@chaos.socialM This user is from outside of this forum
        makdaam@chaos.socialM This user is from outside of this forum
        makdaam@chaos.social
        wrote sidst redigeret af
        #3

        @rysiek What's more it's not just one bot. It's a bot platform that can be driven by markdown files. Just make a useful "skill", wait for it to propagate, then add a few malicious sentences to it.
        People will pay for the tokens to send you their bitcoin wallets.
        Edit:
        This is by design, so even if OpenClaw is fully fixed and bug free the whole concept of it is based on trusting the content of all imported .md files forever.

        1 Reply Last reply
        0
        • rysiek@mstdn.socialR rysiek@mstdn.social

          OpenClaw treats this seriously, of course, and by seriously I mean claims this is normal, nothing to see here – and blames the users:
          https://openclawai.io/blog/openclaw-cve-flood-nine-vulnerabilities-four-days-march-2026

          > This four-day flood isn’t an anomaly. It’s what happens when a project grows from enthusiast tool to infrastructure faster than its security surface can mature.

          > If you’re running OpenClaw, you’re signing up to track upstream releases, apply patches promptly, and monitor advisories — indefinitely.

          🧵

          rysiek@mstdn.socialR This user is from outside of this forum
          rysiek@mstdn.socialR This user is from outside of this forum
          rysiek@mstdn.social
          wrote sidst redigeret af
          #4

          Do they mention any of this on their landing page? No, of course not:
          https://openclawai.io/

          Do they mention this on their quickstart page? No, of course not:
          https://openclawai.io/quickstart

          But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

          > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

          Security fuckup? More like business opportunity, amirite? 🤡

          🧵

          skyglobe@hostux.socialS rysiek@mstdn.socialR marcink@stolat.townM womble@infosec.exchangeW 4 Replies Last reply
          0
          • rysiek@mstdn.socialR rysiek@mstdn.social

            Do they mention any of this on their landing page? No, of course not:
            https://openclawai.io/

            Do they mention this on their quickstart page? No, of course not:
            https://openclawai.io/quickstart

            But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

            > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

            Security fuckup? More like business opportunity, amirite? 🤡

            🧵

            skyglobe@hostux.socialS This user is from outside of this forum
            skyglobe@hostux.socialS This user is from outside of this forum
            skyglobe@hostux.social
            wrote sidst redigeret af
            #5

            @rysiek just to add some LULz: https://days-since-openclaw-cve.com/

            rysiek@mstdn.socialR 1 Reply Last reply
            0
            • skyglobe@hostux.socialS skyglobe@hostux.social

              @rysiek just to add some LULz: https://days-since-openclaw-cve.com/

              rysiek@mstdn.socialR This user is from outside of this forum
              rysiek@mstdn.socialR This user is from outside of this forum
              rysiek@mstdn.social
              wrote sidst redigeret af
              #6

              @skyglobe kek.

              1 Reply Last reply
              0
              • rysiek@mstdn.socialR rysiek@mstdn.social

                There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                Not any more!

                Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                https://github.com/jgamblin/OpenClawCVEs/

                Bam! RCE by asking nicely.

                🧵

                #OpenClaw #AI #Hype #InfoSec

                c0dec0dec0de@hachyderm.ioC This user is from outside of this forum
                c0dec0dec0de@hachyderm.ioC This user is from outside of this forum
                c0dec0dec0de@hachyderm.io
                wrote sidst redigeret af
                #7

                @rysiek simultaneously the easiest and most expensive ever social engineering attempt ever

                rysiek@mstdn.socialR 1 Reply Last reply
                0
                • rysiek@mstdn.socialR rysiek@mstdn.social

                  Do they mention any of this on their landing page? No, of course not:
                  https://openclawai.io/

                  Do they mention this on their quickstart page? No, of course not:
                  https://openclawai.io/quickstart

                  But they sure mention the managed hosting that is "coming soon"! Which of course they shill in their blogpost about the vulnerabilities:

                  > For many users, that’s a reasonable tradeoff. For others, it’s the argument for managed hosting.

                  Security fuckup? More like business opportunity, amirite? 🤡

                  🧵

                  rysiek@mstdn.socialR This user is from outside of this forum
                  rysiek@mstdn.socialR This user is from outside of this forum
                  rysiek@mstdn.social
                  wrote sidst redigeret af
                  #8

                  OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                  Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                  And the way they hide behind the open source label is infuriating:

                  > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                  🧵

                  #OpenClaw #AI

                  rysiek@mstdn.socialR radex@social.hackerspace.plR delta_vee@cosocial.caD noplasticshower@infosec.exchangeN 4 Replies Last reply
                  0
                  • rysiek@mstdn.socialR rysiek@mstdn.social

                    OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                    Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                    And the way they hide behind the open source label is infuriating:

                    > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                    🧵

                    #OpenClaw #AI

                    rysiek@mstdn.socialR This user is from outside of this forum
                    rysiek@mstdn.socialR This user is from outside of this forum
                    rysiek@mstdn.social
                    wrote sidst redigeret af
                    #9

                    It is also entirely par for the course for the broader "AI" ecosystem, which has the same scammy vibes as the NFT space.

                    For years Microsoft had a line in Copilot's ToS (still does) insisting it is for entertainment purposes only (yet they push it in their products):
                    https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                    Anthropic's "extensively trained" model got tricked by a tactic used by a 13yo – "really, I'm a researcher!" and the company still does not see it as their responsibility:
                    https://rys.io/en/181.html#ai-orchestrated-cyberattack

                    🤡

                    🧵/end

                    davidgerard@circumstances.runD greatbigtable@mastodon.socialG 2 Replies Last reply
                    0
                    • rysiek@mstdn.socialR rysiek@mstdn.social

                      OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                      Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                      And the way they hide behind the open source label is infuriating:

                      > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                      🧵

                      #OpenClaw #AI

                      radex@social.hackerspace.plR This user is from outside of this forum
                      radex@social.hackerspace.plR This user is from outside of this forum
                      radex@social.hackerspace.pl
                      wrote sidst redigeret af
                      #10

                      @rysiek to a certain extent, I understand the attitude of “hey, this is just a hobby project, I made it for free, don’t expect *anything*”. I too dislike the entitled attitude of users of open source stuff.

                      *but* the moment this “toy project” became wildly popular, he should have taken down the website and put a big fat warning on GitHub to scare away people who are not experts (but have at least two brain cells). It’s this part that’s, as you said — utterly negligent.

                      rysiek@mstdn.socialR 1 Reply Last reply
                      0
                      • c0dec0dec0de@hachyderm.ioC c0dec0dec0de@hachyderm.io

                        @rysiek simultaneously the easiest and most expensive ever social engineering attempt ever

                        rysiek@mstdn.socialR This user is from outside of this forum
                        rysiek@mstdn.socialR This user is from outside of this forum
                        rysiek@mstdn.social
                        wrote sidst redigeret af
                        #11

                        @c0dec0dec0de I believe it's called "vibe-scamming"

                        1 Reply Last reply
                        0
                        • rysiek@mstdn.socialR rysiek@mstdn.social

                          OpenClaw is utterly negligent in promoting their stuff to regular users and not having gigantic warnings on their landing page and installation guides.

                          Their response to these vulnerabilities, mentioning 128 advisories that are "still pending assignment", and shilling their "managed" service, is laughable and craven.

                          And the way they hide behind the open source label is infuriating:

                          > The open-source model means every vulnerability gets public scrutiny and transparent fixes.

                          🧵

                          #OpenClaw #AI

                          delta_vee@cosocial.caD This user is from outside of this forum
                          delta_vee@cosocial.caD This user is from outside of this forum
                          delta_vee@cosocial.ca
                          wrote sidst redigeret af
                          #12

                          @rysiek "OpenClaw is utterly negligent" is sufficient there 😉

                          1 Reply Last reply
                          0
                          • radex@social.hackerspace.plR radex@social.hackerspace.pl

                            @rysiek to a certain extent, I understand the attitude of “hey, this is just a hobby project, I made it for free, don’t expect *anything*”. I too dislike the entitled attitude of users of open source stuff.

                            *but* the moment this “toy project” became wildly popular, he should have taken down the website and put a big fat warning on GitHub to scare away people who are not experts (but have at least two brain cells). It’s this part that’s, as you said — utterly negligent.

                            rysiek@mstdn.socialR This user is from outside of this forum
                            rysiek@mstdn.socialR This user is from outside of this forum
                            rysiek@mstdn.social
                            wrote sidst redigeret af
                            #13

                            @radex he promoted it from the get go in a way that invited regular non-techies to use it, without ever putting any kind of warning.

                            It was utterly negligent basically from the moment the website went up.

                            radex@social.hackerspace.plR 1 Reply Last reply
                            0
                            • rysiek@mstdn.socialR rysiek@mstdn.social

                              @radex he promoted it from the get go in a way that invited regular non-techies to use it, without ever putting any kind of warning.

                              It was utterly negligent basically from the moment the website went up.

                              radex@social.hackerspace.plR This user is from outside of this forum
                              radex@social.hackerspace.plR This user is from outside of this forum
                              radex@social.hackerspace.pl
                              wrote sidst redigeret af
                              #14

                              @rysiek Right, I haven't actually paid much attention, so I don't know. I'm just saying that in the culture where promoting/marketing hobby/open source projects is even a thing, I would forgive making that mistake initially - but I'd expect a quick reaction on first signs of popularity and/or pushback. (Which obviously *still* did not happen)

                              1 Reply Last reply
                              0
                              • rysiek@mstdn.socialR rysiek@mstdn.social

                                It is also entirely par for the course for the broader "AI" ecosystem, which has the same scammy vibes as the NFT space.

                                For years Microsoft had a line in Copilot's ToS (still does) insisting it is for entertainment purposes only (yet they push it in their products):
                                https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                                Anthropic's "extensively trained" model got tricked by a tactic used by a 13yo – "really, I'm a researcher!" and the company still does not see it as their responsibility:
                                https://rys.io/en/181.html#ai-orchestrated-cyberattack

                                🤡

                                🧵/end

                                davidgerard@circumstances.runD This user is from outside of this forum
                                davidgerard@circumstances.runD This user is from outside of this forum
                                davidgerard@circumstances.run
                                wrote sidst redigeret af
                                #15

                                @rysiek that line's been there since 2024 based on earlier terms since 2023, even the Reg covered it https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                                rysiek@mstdn.socialR 1 Reply Last reply
                                0
                                • rysiek@mstdn.socialR rysiek@mstdn.social

                                  There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                                  Not any more!

                                  Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                                  https://github.com/jgamblin/OpenClawCVEs/

                                  Bam! RCE by asking nicely.

                                  🧵

                                  #OpenClaw #AI #Hype #InfoSec

                                  jmax@mastodon.socialJ This user is from outside of this forum
                                  jmax@mastodon.socialJ This user is from outside of this forum
                                  jmax@mastodon.social
                                  wrote sidst redigeret af
                                  #16

                                  @rysiek Yeah. Remember when "please forward this virus to your friends" was a dry joke?

                                  rysiek@mstdn.socialR 1 Reply Last reply
                                  0
                                  • rysiek@mstdn.socialR rysiek@mstdn.social

                                    There used to be a time when building out a botnet required *some* work – writing exploits, taking over devices, obscuring the purpose of the executable, etc.

                                    Not any more!

                                    Instead of "malware", call it an "AI agent" and people will just happily install it on their devices with full root privileges!
                                    https://github.com/jgamblin/OpenClawCVEs/

                                    Bam! RCE by asking nicely.

                                    🧵

                                    #OpenClaw #AI #Hype #InfoSec

                                    climbertobby@chaos.socialC This user is from outside of this forum
                                    climbertobby@chaos.socialC This user is from outside of this forum
                                    climbertobby@chaos.social
                                    wrote sidst redigeret af
                                    #17

                                    @rysiek 5 nines but for open CVEs instead of digits in percentage availability

                                    1 Reply Last reply
                                    0
                                    • davidgerard@circumstances.runD davidgerard@circumstances.run

                                      @rysiek that line's been there since 2024 based on earlier terms since 2023, even the Reg covered it https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                                      rysiek@mstdn.socialR This user is from outside of this forum
                                      rysiek@mstdn.socialR This user is from outside of this forum
                                      rysiek@mstdn.social
                                      wrote sidst redigeret af
                                      #18

                                      @davidgerard ah, sorry! Fixing. The broader point stands.

                                      davidgerard@circumstances.runD 1 Reply Last reply
                                      0
                                      • jmax@mastodon.socialJ jmax@mastodon.social

                                        @rysiek Yeah. Remember when "please forward this virus to your friends" was a dry joke?

                                        rysiek@mstdn.socialR This user is from outside of this forum
                                        rysiek@mstdn.socialR This user is from outside of this forum
                                        rysiek@mstdn.social
                                        wrote sidst redigeret af
                                        #19

                                        @jmax "and delete your files"

                                        1 Reply Last reply
                                        0
                                        • rysiek@mstdn.socialR rysiek@mstdn.social

                                          It is also entirely par for the course for the broader "AI" ecosystem, which has the same scammy vibes as the NFT space.

                                          For years Microsoft had a line in Copilot's ToS (still does) insisting it is for entertainment purposes only (yet they push it in their products):
                                          https://www.theregister.com/2024/08/14/microsoft_services_agreement_update_warns/

                                          Anthropic's "extensively trained" model got tricked by a tactic used by a 13yo – "really, I'm a researcher!" and the company still does not see it as their responsibility:
                                          https://rys.io/en/181.html#ai-orchestrated-cyberattack

                                          🤡

                                          🧵/end

                                          greatbigtable@mastodon.socialG This user is from outside of this forum
                                          greatbigtable@mastodon.socialG This user is from outside of this forum
                                          greatbigtable@mastodon.social
                                          wrote sidst redigeret af
                                          #20

                                          @rysiek considering the peeks into the leaked Claude Code, jailbreaking it this way is explicitly allowed in the code itself. If you tell it you are part of a security research team or on an authorized entertainment or doing a computer security assignment, it will let you do what you want.

                                          rysiek@mstdn.socialR 1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper