Vulnerability chain in OpenClaw allows any website to silently take full control of a developer’s AI agent
NEW YORK, Feb. 26, 2026 /PRNewswire/ — Oasis Security, the identity security platform, today released new threat research exploring a vulnerability chain in OpenClaw that allows any website to silently take full control of a developer’s AI agent—with no plugins, extensions, or user interaction required.
OpenClaw, the open-source AI agent that rocketed to over 100,000 GitHub stars in five days, has become the default personal assistant for thousands of developers. It runs on their laptops, connects to their messaging apps, calendars, and dev tools, and takes autonomous actions on their behalf. It has also been trivially vulnerable to hijacking from any website the developer visits.
The Rise of OpenClaw
OpenClaw is a self-hosted AI agent that recently took the developer world by storm, becoming one of the fastest-growing open-source projects in history. Users interact with OpenClaw through a web dashboard or terminal, allowing it to autonomously send messages, run commands, manage workflows across platforms, and even form an emergent AI social network.
The Vulnerability
The vulnerability the Oasis Security Research Team discovered lives in the core system itself—no plugins, no marketplace, no user-installed extensions—just the bare OpenClaw gateway, running exactly as documented.
Here’s the scenario: A developer has OpenClaw running on their laptop, with the gateway bound to localhost, protected by a password. They’re browsing the web and accidentally land on a malicious website. That’s all it takes.
The full attack chain works as follows:
This means an attacker could instruct the agent to search the developer’s Slack history for API keys, read private messages, exfiltrate files from connected devices, or execute arbitrary shell commands on any paired node. For a developer with typical OpenClaw integrations, this is equivalent to full workstation compromise, initiated from a browser tab.
The Oasis Security Research Team demonstrated this end-to-end: From a browser on an unrelated website, its proof-of-concept guessed the gateway password, connected with full permissions, and successfully interacted with the user’s AI agent, all without the user seeing any indication that anything had happened.
What Organizations Should Do
The rapid adoption of tools like OpenClaw means many organizations already have instances running on developer machines, often without IT’s knowledge. Here are recommended steps to take:
As AI agents become standard tools in every developer’s workflow, the question isn’t whether to adopt them, it’s whether organizations can govern them.
“Prompt injection and agent hijacking cases are persistent threats in this era of broad AI adoption,” said Elad Luz, Head of Research at Oasis Security. “Managing the scope of AI agents’ access is a critical governance step organizations must take to reduce the blast radius and manage risk.”
If you or your team run OpenClaw, update to version 2026.2.25 or later immediately.
Responsible Disclosure and Fix
Oasis Security reported this vulnerability to the OpenClaw security team with full technical details, root cause analysis, and proof-of-concept code. The team classified it as high severity and pushed a fix in less than 24 hours, an impressive response time, especially for a volunteer-driven open-source project.
Read the Oasis Security Research Team’s blog for more information, and whitepaper for the full technical breakdown.
About Oasis Security
Oasis Security is the identity security platform for the Agentic Access era. As enterprises adopt AI at scale, they face a new security challenge: thousands of machine identities and autonomous agents operating at machine speed, without the SSO, MFA, and governance controls that protect human access. Oasis delivers unified discovery, policy intelligence, and lifecycle enforcement across hybrid environments, giving security teams the visibility to find what legacy tools miss, the context to understand what actually matters, and the automation to govern at the speed of AI. Backed by Accel, Cyberstarts, and Sequoia Capital, Oasis Security was founded in 2022 by Danny Brickman and Amit Zimerman.
Media Contact
Katherine Benfield
ICR for Oasis Security
[email protected]
View original content to download multimedia:https://www.prnewswire.com/news-releases/oasis-security-research-team-discovers-critical-vulnerability-in-openclaw-302698939.html
SOURCE Oasis Security


