ClawJacked: High-Severity Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
Security firm Oasis Security disclosed a high-severity vulnerability dubbed ClawJacked in OpenClaw, a locally running AI agent tool, that allows a malicious website to connect to the agent's local WebSocket gateway and take full control of it without the user's knowledge. The attack requires only that a developer has OpenClaw running on their laptop with the gateway bound to localhost — a standard configuration — and then visits an attacker-controlled webpage, which uses JavaScript to exploit the WebSocket interface. OpenClaw has issued a fix, but the flaw underscores a structural risk in AI agent frameworks that expose local WebSocket gateways without robust origin validation.
Key Takeaways
- ClawJacked flaw: malicious website JavaScript connects to OpenClaw's localhost WebSocket gateway and takes control of the AI agent — no plugins or extensions required, affects the base OpenClaw installation
- Oasis Security research confirms the attack works when a developer runs OpenClaw on localhost with its default gateway configuration; the attack is initiated by visiting a malicious webpage
- OpenClaw is the same AI agent at the center of the Clinejection npm supply chain attack (Feb 2026) and Bing AI malware distribution campaign — multiple active threat vectors now exploit OpenClaw's user base
Original source: The Hacker News / Oasis Security