⚠ 1,184 Deception ClawHub skills have been discovered, stealing SSH, passwords, encrypted wallets, and even opening reverse shells 💻 🔍 After the "ClawHavoc" incident, more than 2,400 suspicious packages were deleted and VirusTotal scans were enabled to enhance preliminary review efforts 🚨 🚀 Agents can directly interact with Polygon/Solana, enabling rapid expansion but with obvious lag in security governance, increasing financial risks 📈 🕵️♂️ Corporate employees frequently deploy privately, forming shadow IT risks, with internal controls unable to keep up with technological dissemination ⚠️ ⚖️ Industry recommends testing in isolated environments, cautiously accepting third-party skills; balancing convenience and security to prevent financial losses 💡
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
⚠ 1,184 Deception ClawHub skills have been discovered, stealing SSH, passwords, encrypted wallets, and even opening reverse shells 💻 🔍 After the "ClawHavoc" incident, more than 2,400 suspicious packages were deleted and VirusTotal scans were enabled to enhance preliminary review efforts 🚨 🚀 Agents can directly interact with Polygon/Solana, enabling rapid expansion but with obvious lag in security governance, increasing financial risks 📈 🕵️♂️ Corporate employees frequently deploy privately, forming shadow IT risks, with internal controls unable to keep up with technological dissemination ⚠️ ⚖️ Industry recommends testing in isolated environments, cautiously accepting third-party skills; balancing convenience and security to prevent financial losses 💡