Join us

OpenClaw - Former Moltbot, Former Clawdbot - Went Viral Overnight. Then Security Reality Hit.

OpenClaw - Former Moltbot, Former Clawdbot - Went Viral Overnight. Then Security Reality Hit.

TL;DR

OpenClaw, an open-source AI assistant platform, has been launched, evolving from Clawdbot and Moltbot. It features new plugins, enhanced security, and support for new models, while addressing a major security vulnerability. The platform emphasizes community involvement and invites contributions for its development.

Key Points

Highlight key points with color coding based on sentiment (positive, neutral, negative).

OpenClaw is an open-source AI assistant platform that evolved from Clawdbot and Moltbot.

The latest release of OpenClaw includes new features such as Twitch and Google Chat plugins.

A significant security vulnerability, CVE-2026-25253, involving token exfiltration was addressed.

OpenClaw supports new models such as KIMI K2.5 and Xiaomi MiMo-V2-Flash.

The token exfiltration vulnerability was fixed in version 2026.1.29, released on January 30, 2026.

OpenClaw is an open-source AI assistant platform that evolved from its earlier iterations, Clawdbot and Moltbot. The project emphasizes running on user-selected infrastructure, giving users control over their data, credentials, and execution environment. As part of this transition, the project underwent a rebranding and introduced new features, including plugins for Twitch and Google Chat. OpenClaw also expanded model support to include KIMI K2.5 and Xiaomi MiMo-V2-Flash.

Security and community involvement are central to OpenClaw's development. This focus was underscored by the discovery and remediation of CVE-2026-25253, a critical vulnerability with a CVSS score of 8.8. The issue involved authentication token exfiltration that could lead to full gateway compromise. The root cause was the Control UI’s failure to validate the gatewayUrl parameter from the query string, which allowed an attacker-controlled endpoint to receive the stored gateway token.

The vulnerability was addressed in version 2026.1.29. As part of the fix, OpenClaw now requires explicit user confirmation when connecting to a new gateway URL in the Control UI, wich reduced the risk of token exfiltration and unauthorized gateway access.

At the same time, the incident landed in a broader context that has unsettled parts of the AI tooling community: the emergence of autonomous agent ecosystems where agents interact primarily with other agents. Experimental platforms such as Moltbook have shown how large populations of AI agents can rapidly generate shared narratives, belief systems, and internal "economies" without direct human orchestration. One of the most visible examples has been the appearance of satirical or pseudo-religious constructs such as the so-called "Church of Molt," sometimes referred to as Crustafarianism.

While these narratives are largely fictional and memetic, they expose a deeper security concern. When agents can persuade, influence, or route actions to other agents, traditional assumptions about users, attackers, and victims begin to blur. Even without a verified scam or human-controlled fraud ring, systems that allow agents to exchange tokens, credentials, URLs, or execution context risk creating self-reinforcing exploit loops. In such environments, an agent does not need malicious intent in the human sense; it only needs an incentive structure and insufficient validation to propagate unsafe behavior.

This is where OpenClaw's vulnerability becomes relevant beyond its immediate fix. The Control UI flaw demonstrated how a single trusted configuration pathway could be abused to redirect credentials. In an agent-dominated ecosystem, similar flaws could be amplified indirectly. A convincing narrative, shared by multiple agents, could encourage configuration changes, gateway connections, or plugin activations that appear legitimate but route sensitive data elsewhere. What looks like "agents scamming agents" is often not deception in the classic sense, but emergent coordination exploiting weak trust boundaries.

The lesson from both the vulnerability and the surrounding agent folklore is the same: in autonomous AI ecosystems, trust must be explicit, contextual, and continuously revalidated. Otherwise, even fictional religions can become vectors for very real failures.

Key Numbers

Present key numerics and statistics in a minimalist format.
100,000

The number of GitHub stars for OpenClaw.

2 Million

The number of visitors OpenClaw drew in a single week.

8.8

The CVSS score of the security vulnerability CVE-2026-25253.

v2026.1.29

The version number where the vulnerability CVE-2026-25253 was addressed.

34

The number of security-related commits in the latest release.

January 30 2026

The date on which the security fix for CVE-2026-25253 was released.

Critical

The severity classification of CVE-2026-25253 based on CVSS score.

2

The number of previous project names before OpenClaw.

Stakeholder Relationships

An interactive diagram mapping entities directly or indirectly involved in this news. Drag nodes to rearrange them and see relationship details.

People

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
Peter Steinberger Creator and Maintainer

Creator and primary maintainer of OpenClaw, who disclosed and addressed the CVE-2026-25253 security vulnerability.

Organizations

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
OpenClaw Open Source Project

OpenClaw is an open-source AI assistant platform that evolved from Clawdbot and Moltbot.

Claw Crew Community

Claw Crew is the contributor community involved in the development, security hardening, and support of the OpenClaw project.

Anthropic Company

Anthropic is an AI research company whose legal team requested the original Clawd project name be changed.

Tools

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
OpenClaw AI Assistant Platform

An open-source AI agent platform that runs on user-controlled infrastructure and integrates with multiple chat applications.

Twitch Plugin Communication Plugin

A plugin enabling OpenClaw to integrate with Twitch for AI-assisted interactions.

Google Chat Plugin Communication Plugin

A plugin allowing OpenClaw to operate within Google Chat environments.

KIMI K2.5 AI Model

An AI model supported by OpenClaw for natural language processing and agent execution.

Xiaomi MiMo-V2-Flash AI Model

An AI model integrated into OpenClaw to improve response speed and interaction quality.

Control UI Management Interface

The web-based interface used to manage and connect to the OpenClaw gateway.

OpenClaw Gateway Local Service

The local or self-hosted service that executes actions and connects OpenClaw to external systems.

CVE-2026-25253 Security Vulnerability

A token exfiltration vulnerability in the OpenClaw Control UI that could lead to full gateway compromise and remote code execution.

Timeline of Events

Timeline of key events and milestones.
Nov 2025 Project creation

The project was created under the initial name "Clawd."

Dec 2025 First rebranding

The project was renamed from "Clawd" to "Moltbot" following naming concerns.

Jan 2026 Viral adoption

Moltbot gained widespread attention, reaching over 100,000 GitHub stars and drawing approximately 2 million visitors in a single week.

Jan 2026 Final rebranding

The project was rebranded from "Moltbot" to "OpenClaw" after trademark checks and domain acquisition.

Jan 30, 2026 Security fix release

OpenClaw version 2026.1.29 was released, addressing the critical token exfiltration vulnerability CVE-2026-25253.

Enjoyed it?

Get weekly updates delivered straight to your inbox, it only takes 3 seconds!

Subscribe to our weekly newsletter Kala to receive similar updates for free!

What is FAUN.news()?

Let's keep in touch!

Stay updated with my latest posts and news. I share insights, updates, and exclusive content.

Unsubscribe anytime. By subscribing, you share your email with @kala and accept our Terms & Privacy.

Give a Pawfive to this post!


Only registered users can post comments. Please, login or signup.

Start writing about what excites you in tech — connect with developers, grow your voice, and get rewarded.

Join other developers and claim your FAUN.dev() account now!

FAUN.dev()
FAUN.dev()

FAUN.dev() is a developer-first platform built with a simple goal: help engineers stay sharp without wasting their time.

Avatar

Kala #GenAI

FAUN.dev()

@kala
Generative AI Weekly Newsletter, Kala. Curated GenAI news, tutorials, tools and more!
Developer Influence
1

Influence

1

Total Hits

108

Posts

Featured Course(s)
DevSecOps in Practice
DevSecOps in Practice

A Hands-On Guide to Operationalizing DevSecOps at Scale