{"id":951,"date":"2026-01-30T16:59:02","date_gmt":"2026-01-30T16:59:02","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/"},"modified":"2026-01-30T16:59:02","modified_gmt":"2026-01-30T16:59:02","slug":"silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/","title":{"rendered":"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws"},"content":{"rendered":"<p>A hacker demonstrated that the viral new AI agent Moltbot (formally Clawdbot) is easy to hack via a backdoor in an attached support shop.Clawdbot has become a Silicon Valley sensation among a certain type of AI-booster techbro, and the backdoor highlights just one of the things that can go awry if you use AI to automate your life and work.Software engineer Peter Steinberger first released Moltbot as Clawdbot last November. (He changed the name on January 27 at the request of Anthropic who runs a chatbot called Claude.) Moltbot runs on a local server and, to hear its boosters tell it, works the way AI agents do in fiction. Users talk to it through a communication platform like Discord, Telegram, or Signal and the AI does various tasks for them.<\/p>\n<p>According to its ardent admirers, Moltbot will clean up your inbox, buy stuff, and manage your calendar. With some tinkering, it\u2019ll run on a Mac Mini and it seems to have a better memory than other AI agents. Moltbot\u2019s fans say that this, finally, is the AI future companies like OpenAI and Anthropic have been promising.\u00a0The popularity of Moltbot is sort of hard to explain if you\u2019re not already tapped into a specific sect of Silicon Valley AI boosters. One benefit is the interface. Instead of going to a discrete website like ChatGPT, Moltbot users can talk to the AI through Telegram, Signal, or Teams. It\u2019s also active, rather than passive. It also takes initiative. Unlike Claude or Copilot, Moltbot takes initiative and performs tasks it thinks a user wants done. The project has more than 100,000 stars on GitHub and is so popular it spiked Cloudflare\u2019s stock price by 14% earlier this week because Moltbot runs on the service\u2019s infrastructure.But inviting an AI agent into your life comes with massive security risks. Hacker Jamieson O&#8217;Reilly demonstrated those risks in three experiments he wrote up as long posts on X. In the first, he showed that it\u2019s possible for bad actors to access someone\u2019s Moltbot through any of its processes connected to the public facing internet. From there, the hacker could use Moltbot to access everything else, including Signal messages, a user had turned over to Moltbot.In the second post, O&#8217;Reilly created a supply chain attack on Moltbot through ClawdHub. \u201cThink of it like your mobile app store for AI agent capabilities,\u201d O\u2019Reilly told 404 Media. \u201cClawdHub is where people share \u2018skills,\u2019 which are basically instruction packages that teach the AI how to do specific things. So if you want Clawd\/Moltbot to post tweets for you, or go shopping on Amazon, there&#8217;s a skill for that. The idea is that instead of everyone writing the same instructions from scratch, you download pre-made skills from people who&#8217;ve already figured it out.\u201dThe problem, as O\u2019Reilly pointed out, is that it\u2019s easy for a hacker to create a \u201cskill\u201d for ClawdHub that contains malicious code. That code could gain access to whatever Moltbot sees and get up to all kinds of trouble on behalf of whoever created it.For his experiment, O\u2019Reilly released a \u201cskill\u201d on ClawdHub called \u201cWhat Would Elon Do\u201d that promised to help people think and make decisions like Elon Musk. Once the skill was integrated into people\u2019s Moltbot and actually used, it sent a command line pop-up to the user that said \u201cYOU JUST GOT PWNED (harmlessly.)\u201dAnother vulnerability on ClawdHub was the way it communicated to users what skills were safe: it showed them how many times other people had downloaded it. O\u2019Reilly was able to write a script that pumped \u201cWhat Would Elon Do\u201d up by 4,000 downloads and thus make it look safe and attractive.\u00a0\u201cWhen you compromise a supply chain, you&#8217;re not asking victims to trust you, you&#8217;re hijacking trust they&#8217;ve already placed in someone else,\u201d he said. \u201cThat is, a developer or developers who&#8217;ve been publishing useful tools for years has built up credibility, download counts, stars, and a reputation. If you compromise their account or their distribution channel, you inherit all of that.\u201dIn his third, and final, attack on Moltbot, O\u2019Reilly was able to upload an SVG (vector graphics) file to ClawdHub\u2019s servers and inject some JavaScript that ran on ClawdHub\u2019s servers. O\u2019Reilly used the access to play a song from The Matrix while lobsters danced around a Photoshopped picture of himself as Neo. \u201cAn SVG file just hijacked your entire session,\u201d reads scrolling text at the top of a skill hosted on ClawdHub.O\u2019Reilly attacks on Moltbot and ClawdHub highlight a systemic security problem in AI agents. If you want these free agents doing tasks for you, they require a certain amount of access to your data and that access will always come with risks. I asked O\u2019Reilly if this was a solvable problem and he told me that \u201csolvable\u201d isn&#8217;t the right word. He prefers the word \u201cmanegeable.\u201d\u201cIf we&#8217;re serious about it we can mitigate a lot. The fundamental tension is that AI agents are useful precisely because they have access to things. They need to read your files to help you code. They need credentials to deploy on your behalf. They need to execute commands to automate your workflow,\u201d he said. \u201cEvery useful capability is also an attack surface. What we can do is build better permission models, better sandboxing, better auditing. Make it so compromises are contained rather than catastrophic.\u201dWe\u2019ve been here before. \u201cThe browser security model took decades to mature, and it&#8217;s still not perfect,\u201d O\u2019Reilly said. \u201cAI agents are at the \u2018early days of the web\u2019 stage where we&#8217;re still figuring out what the equivalent of same-origin policy should even look like. It&#8217;s solvable in the sense that we can make it much better. It&#8217;s not solvable in the sense that there will always be a tradeoff between capability and risk.\u201dAs AI agents grow in popularity and more people learn to use them, it\u2019s important to return to first principles, he said. \u201cDon&#8217;t give the agent access to everything just because it&#8217;s convenient,\u201d O\u2019Reilley said. \u201cIf it only needs to read code, don&#8217;t give it write access to your production servers. Beyond that, treat your agent infrastructure like you&#8217;d treat any internet-facing service. Put it behind proper authentication, don&#8217;t expose control interfaces to the public internet, audit what it has access to, and be skeptical of the supply chain. Don&#8217;t just install the most popular skill without reading what it does. Check when it was last updated, who maintains it, what files it includes. Compartmentalise where possible. Run agent stuff in isolated environments. If it gets compromised, limit the blast radius.\u201dNone of this is new, it\u2019s how security and software have worked for a long time. \u201cEvery single vulnerability I found in this research, the proxy trust issues, the supply chain poisoning, the stored XSS, these have been plaguing traditional software for decades,\u201d he said. \u201cWe&#8217;ve known about XSS since the late 90s. Supply chain attacks have been a documented threat vector for over a decade. Misconfigured authentication and exposed admin interfaces are as old as the web itself. Even seasoned developers overlook this stuff. They always have. Security gets deprioritised because it&#8217;s invisible when it&#8217;s working and only becomes visible when it fails.\u201dWhat\u2019s different now is that AI has created a world where new people are using a tool they think will make them software engineers. People with little to no experience working a command line or playing with JSON are vibe coding complex systems without understanding how they work or what they\u2019re building. \u201cAnd I want to be clear\u2014I&#8217;m fully supportive of this. More people building is a good thing. The democratisation of software development is genuinely exciting,\u201d O\u2019Reilly said. \u201cBut these new builders are going to need to learn security just as fast as they&#8217;re learning to vibe code. You can&#8217;t speedrun development and ignore the lessons we&#8217;ve spent twenty years learning the hard way.\u201dMoltbot\u2019s Steinberger did not respond to 404 Media\u2019s request for comment but O\u2019Reilly said the developer\u2019s been responsive and supportive as he\u2019s red-teamed Moltbot. \u201cHe takes it seriously, no ego about it. Some maintainers get defensive when you report vulnerabilities, but Peterimmediately engaged, started pushing fixes, and has been collaborative throughout,\u201d O\u2019Reilly said. \u201cI&#8217;ve submitted [pull requests] with fixes myself because I actually want this project to succeed. That&#8217;s why I&#8217;m doing this publicly rather than just pointing my finger and laughing Ralph Wiggum style\u2026the open source model works when people act in good faith, and Peter&#8217;s doing exactly that.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<div>The AI agent once called ClawdBot is enchanting tech elites, but its security vulnerabilities highlight systemic problems with AI.<\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[4,1,13],"tags":[3],"class_list":["post-951","post","type-post","status-publish","format-standard","hentry","category-ai","category-ai-and-ml","category-news","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"The AI agent once called ClawdBot is enchanting tech elites, but its security vulnerabilities highlight systemic problems with AI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-30T16:59:02+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws\",\"datePublished\":\"2026-01-30T16:59:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\"},\"wordCount\":1496,\"keywords\":[\"AI\"],\"articleSection\":[\"AI\",\"AI and ML\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\",\"name\":\"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-01-30T16:59:02+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws - Imperative Business Ventures Limited","og_description":"The AI agent once called ClawdBot is enchanting tech elites, but its security vulnerabilities highlight systemic problems with AI.","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-01-30T16:59:02+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws","datePublished":"2026-01-30T16:59:02+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/"},"wordCount":1496,"keywords":["AI"],"articleSection":["AI","AI and ML","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/","name":"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-01-30T16:59:02+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/30\/silicon-valleys-favorite-new-ai-agent-has-serious-security-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Silicon Valley\u2019s Favorite New AI Agent Has Serious Security Flaws"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=951"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/951\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}