
ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough
The numbers are now public: 2,371 skills in OpenClaw's ClawHub registry contain malicious patterns. 18.7% of the most popular ones carry confirmed ClawHavoc indicators — credential harvesting, C2 callbacks, data exfiltration, embedded shell payloads that pass static analysis completely clean. The industry response has been twelve new scanning tools. Each one ships with a version of the same caveat: "No findings does not mean no risk." That caveat is worth sitting with. What Scanning Actually Does Static scanning — pattern matching, YARA rules, LLM-as-judge — evaluates the skill artifact. It looks at code structure, known IOCs, behavioral signatures. It is useful. It is not sufficient. The ClawHavoc deepresearch skill passed static analysis. The malicious payload was embedded in the SKILL.md instructions — plain text, no code, no signature. The skill downloaded and executed a remote bash script only when an agent followed its "setup" instructions at runtime. Scanning the artifact would
Continue reading on Dev.to
Opens in a new tab


