Back to News
general🌐InternationalThe Hacker News

Info Stealer Exfiltrates OpenClaw AI Agent Configurations and "Souls"

Monday, February 16, 2026

Info Stealer Exfiltrates OpenClaw AI Agent Configurations and "Souls"

What

An information stealer, likely Vidar, used a broad file-grabbing routine to exfiltrate critical OpenClaw AI agent configuration files, including gateway tokens, cryptographic keys, and "soul" files. This signifies a pivotal shift in infostealer behavior towards harvesting personal AI agent identities and operational contexts, posing new risks for AI-integrated workflows.

Where

OpenClaw AI agent users, specifically those with exposed instances or infected by information stealers.

When

Recently disclosed by cybersecurity researchers; OpenClaw debuted November 2025.

Key Factors

  • The information stealer targeted specific files like `openclaw.json`, `device.json`, and `soul.md` through a generic file-grabbing routine, not a custom module, to capture AI agent data.
  • The theft of the OpenClaw gateway authentication token enables attackers to remotely connect to or masquerade as the victim's AI agent, potentially leading to unauthorized access and actions.
  • Hundreds of thousands of exposed OpenClaw instances are vulnerable to remote code execution (RCE), further escalating the risk of compromise for AI agents.

Takeaways

  • Users of AI agents like OpenClaw should secure their environments, ensure proper port configuration, and regularly audit for exposed instances and potential misconfigurations.
  • Organizations must anticipate and prepare for the evolution of infostealers to target AI agent-specific data, implementing robust data protection and access control measures for AI systems.
Read Full Article

Opens original article on The Hacker News

Similar News