TLDR Fake $CLAW token scams lure OpenClaw developers on GitHub. Attackers use malicious JS to steal crypto wallets and erase data. Developers targeted via fake TLDR Fake $CLAW token scams lure OpenClaw developers on GitHub. Attackers use malicious JS to steal crypto wallets and erase data. Developers targeted via fake

Hackers Target Developers with Fake OpenClaw Token Giveaway

2026/03/19 19:29
3 min read
For feedback or concerns regarding this content, please contact us at [email protected]

TLDR

  • Fake $CLAW token scams lure OpenClaw developers on GitHub.
  • Attackers use malicious JS to steal crypto wallets and erase data.
  • Developers targeted via fake issues, repos, and personalized tags.
  • OpenClaw bans crypto promotion on Discord to fight phishing.
  • Security tips: block token-claw.xyz, revoke wallet access immediately.

OpenClaw’s growing popularity has triggered a new phishing campaign targeting developers on GitHub. Attackers create fake accounts, post fraudulent issues, and tag developers to lure them. The campaign aims to trick users into connecting wallets on malicious websites to steal crypto funds.

The scam claims developers won $5,000 worth of $CLAW tokens and directs them to fake sites resembling OpenClaw’s official page. Hackers use the appearance of legitimacy to make the lure more convincing and targeted. Researchers warn that any interaction with these sites could compromise wallets.

OpenClaw’s open-source framework now operates under a foundation after gaining wider visibility. The project allows persistent AI agents to run tasks, access messaging apps, and manage schedules autonomously. Its high-profile transition has attracted both attention and exploitation by bad actors.

Phishing Techniques Exploit OpenClaw’s GitHub Presence

Hackers identify OpenClaw contributors using GitHub features like starred repositories and issue threads. They create repositories under attacker-controlled accounts to engage multiple developers at once. These actions make the scam appear personalized and credible to victims.

Malicious JavaScript files, such as “eleven.js,” carry wallet-stealing code designed to remain hidden. The malware includes a “nuke” function that erases local browser data to avoid detection. It also tracks user actions like PromptTx, Approved, and Declined, sending data to command servers.

Researchers traced at least one wallet address linked to the campaign, but no confirmed thefts occurred. The attackers delete accounts quickly after posting, limiting exposure and complicating investigations. OpenClaw’s developer community remains a high-value target due to its growing user base.

OpenClaw Enforces Anti-Crypto Policies Amid Scam

OpenClaw’s creator, Peter Steinberger, has banned crypto promotion across its Discord to prevent scams. Developers attempting to discuss tokens face removal or server restrictions to maintain safety. This strict approach aims to reduce fraudulent activity linked to OpenClaw’s framework.

The campaign surfaced weeks after OpenAI announced Steinberger would lead OpenClaw’s personal AI agent initiative. OpenClaw’s visibility surged, making it a prime target for phishing campaigns exploiting the project’s name. Researchers emphasize that developers must avoid unverified token giveaways claiming to be related to OpenClaw.

Security platforms recommend blocking sites like token-claw[.]xyz and watery-compost[.]today to prevent wallet compromise. Users who recently connected wallets should revoke permissions immediately to secure their funds. OpenClaw continues growing but now faces challenges from attackers exploiting its popularity.

The post Hackers Target Developers with Fake OpenClaw Token Giveaway appeared first on CoinCentral.

Market Opportunity
XYZVerse Logo
XYZVerse Price(XYZ)
$0,0001018
$0,0001018$0,0001018
-0,19%
USD
XYZVerse (XYZ) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.