🦞ClawVerse.io
Skills65MCP30Plugins20Agents20Deploy28Projects99Pulse30
+ Submit
ClawVerse.io — Every Claw. One Universe. · Built for the OpenClaw ecosystem
Release v0.1.0 · 2026-02-14 · 8381118 · Data updated: 2026-02-17

Stay in the loop

← Pulse

Security Intelligence Center

Real-time security overview for the OpenClaw ecosystem. Powered by VirusTotal scanning, OWASP MCP Top 10 framework, and community reports.

Ecosystem Threat Overview
Malicious Skills Found
400+
MCP Exploit Probability
92%
with 10+ plugins
MCP Vulnerability Rate
7.2%
of servers affected
Tool Poisoning Rate
5.5%
of MCP servers
Enterprise AI Security
6%
have advanced strategy
Blocked on ClawVerse
3
of 65 skills
Flagged on ClawVerse
2
under investigation
Verified Safe
29
of 65 skills
Last updated: 2026-02-13 | Sources: VentureBeat, Queen's University, OWASP, ClawVerse scans

ClawVerse Security Ratings

🟢 Verified
29 (45%)
🟡 Reviewed
24 (37%)
🟠 Unreviewed
7 (11%)
🔴 Flagged
2 (3%)
⛔ Blocked
3 (5%)

OWASP MCP Top 10

2025

The OWASP Model Context Protocol Top 10 identifies the most critical security risks in MCP-based agent tool ecosystems. ClawVerse maps its security ratings and permission analysis to this framework.

#1
MCP01

Tool Poisoning

Critical

Malicious tools hide harmful instructions in descriptions invisible to users but read by LLMs, enabling data exfiltration and unauthorized actions.

Related Permissions:Shell AccessNetwork AccessFile System
Mitigations:
  • ●Review tool descriptions for hidden instructions
  • ●Use tools with Verified security rating only
  • ●Monitor outbound network calls from agents
#2
MCP02

Rug Pull

Critical

Initially safe tools are updated to include malicious functionality after gaining user trust and installs.

Related Permissions:Shell AccessNetwork AccessFile System
Mitigations:
  • ●Pin tool versions and review updates before upgrading
  • ●Check ClawVerse health indicators for suspicious changes
  • ●Enable VirusTotal continuous monitoring
#3
MCP03

Transitive Access Abuse

Critical

A compromised tool leverages permissions granted to other trusted tools in the same agent session.

Related Permissions:Shell AccessFile SystemAPI Key Access
Mitigations:
  • ●Apply principle of least privilege per tool
  • ●Isolate high-risk tools in separate sessions
  • ●Audit permission chains across tool stacks
#4
MCP04

Tool Argument Injection

High

Attackers manipulate tool inputs through crafted prompts, causing tools to execute unintended operations.

Related Permissions:Shell AccessFile System
Mitigations:
  • ●Validate and sanitize all tool arguments
  • ●Use parameterized queries for database tools
  • ●Limit shell command scope
#5
MCP05

Privilege Escalation via Tool Chaining

High

Attackers chain multiple low-privilege tools together to achieve actions that no single tool should allow.

Related Permissions:Shell AccessNetwork AccessFile System
Mitigations:
  • ●Monitor cross-tool action sequences
  • ●Set rate limits on sensitive operations
  • ●Review tool combinations in your stack
#6
MCP06

Excessive Permission Scope

High

Tools request more permissions than necessary for their stated functionality, expanding the attack surface.

Related Permissions:Shell AccessFile SystemNetwork AccessAPI Key Access
Mitigations:
  • ●Compare permissions to functionality (use ClawVerse risk indicators)
  • ●Prefer tools with minimal permission sets
  • ●Reject tools requesting shell + network + file together
#7
MCP07

Insecure Credential Storage

High

API keys and tokens stored in plaintext config files or environment variables accessible to all tools.

Related Permissions:API Key AccessFile System
Mitigations:
  • ●Use encrypted credential stores
  • ●Rotate API keys regularly
  • ●Limit file system access for tools requiring API keys
#8
MCP08

Insufficient Sandboxing

Medium

Tools execute with host-level access instead of being isolated in containers or sandboxed environments.

Related Permissions:Shell AccessFile System
Mitigations:
  • ●Run tools in containerized environments
  • ●Use NanoClaw or Docker-based deploy options
  • ●Enable filesystem access controls
#9
MCP09

Lack of Tool Integrity Verification

Medium

No cryptographic verification that a tool has not been tampered with between installation and execution.

Related Permissions:Network Access
Mitigations:
  • ●Use tools from Verified sources on ClawVerse
  • ●Check VirusTotal scan status before installing
  • ●Verify tool checksums when available
#10
MCP10

Logging and Monitoring Gaps

Medium

Insufficient logging of tool actions makes it impossible to detect or investigate security incidents.

Related Permissions:Shell AccessNetwork Access
Mitigations:
  • ●Enable agent activity logging
  • ●Monitor for unusual outbound connections
  • ●Set up alerts for sensitive file access

Permission Risk Matrix

Understanding what each permission allows and the associated risk level. Skills requesting multiple high-risk permissions should be carefully evaluated.

Shell Access
15 skillscritical

Can execute arbitrary system commands on your machine. A compromised tool with shell access can install malware, modify system files, or exfiltrate data.

  • ●Execute system commands (rm, curl, wget)
  • ●Install or remove software
  • ●Access other processes and services
File System
27 skillshigh

Can read and write files on your system. Malicious tools can steal SSH keys, credentials, browser data, or modify configuration files.

  • ●Read ~/.ssh/*, ~/.aws/credentials
  • ●Access browser cookies and passwords
  • ●Modify config files or inject code
Network Access
44 skillshigh

Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.

  • ●Send data to external servers
  • ●Download malicious payloads
  • ●Establish reverse shells
API Key Access
26 skillsmedium

Requires API keys or tokens to function. If the tool is compromised, your API keys could be exfiltrated and used for unauthorized access or billing abuse.

  • ●Access your API quotas and billing
  • ●Impersonate your identity to services
  • ●Leak keys to third parties

Recent Security Alerts

View all in Pulse →
SECURITY2026-02-17

Supply Chain Attack: Fake Postmark MCP Server BCC'd All Emails

A trojanized MCP server impersonating Postmark was discovered BCC'ing all outbound emails to an attacker-controlled address. Check your skill dependencies immediately.

SECURITY2026-02-14

48% of Security Pros Name Agentic AI as #1 Attack Vector for 2026

Industry survey finds agentic AI is the top attack vector concern. 82% of MCP implementations have path traversal risks, 53% use static API keys.

SECURITY2026-02-12

OWASP Publishes MCP Top 10 Security Risks

Tool Poisoning ranked #1, followed by Rug Pull and Transitive Access Abuse. ClawVerse now maps security ratings to the OWASP MCP Top 10 framework.

SECURITY2026-02-11

Critical RCE in mcp-remote Package (CVSS 9.6)

The widely-used mcp-remote package (500K+ downloads) has a critical remote code execution vulnerability. Update immediately or remove from your stack.

SECURITY2026-02-10

92% Exploit Probability for MCP Stacks with 10+ Plugins

VentureBeat research reveals that the probability of at least one exploitable vulnerability reaches 92% when using 10 or more MCP plugins in a stack.

SECURITY2026-02-07

400+ Malicious Skills Discovered on ClawHub/GitHub

Skills disguised as useful tools were found stealing API keys, SSH credentials, browser passwords, and crypto wallets. VirusTotal partnership scanning has begun.

SECURITY2026-02-06

3 RCE Vulnerabilities Found in Anthropic Git MCP Server

Security researchers discovered three remote code execution vulnerabilities in Anthropic's official Git MCP server. Patches available in v2.1.4+.

SECURITY2026-02-03

Tool Poisoning Campaign Targets Finance Skills

A coordinated campaign of trojanized finance-related skills detected. crypto-wallet-sync and defi-token-tracker have been flagged. Check your stacks for affected tools.

SECURITY2026-01-28

Queen's University Study: 7.2% of MCP Servers Have Vulnerabilities

Academic research finds 7.2% of MCP servers contain general vulnerabilities and 5.5% are susceptible to tool poisoning attacks. Only 6% of enterprises have advanced AI security.

Flagged & Blocked Skills

⛔ Blocked
claude-proxy-free

Free Claude API proxy with unlimited requests

Network AccessShell AccessFile System
⛔ Blocked
fake-gpt-unlimited

Unlimited GPT-4 access through unofficial proxy endpoints

Network AccessShell AccessFile System
⛔ Blocked
ssh-key-exporter

Export and backup SSH keys to cloud storage

File SystemShell AccessNetwork Access
🔴 Flagged
crypto-wallet-sync

Sync and monitor cryptocurrency wallet balances

API Key AccessNetwork AccessFile System
🔴 Flagged
defi-token-tracker

Monitor DeFi token prices and wallet balances across chains

API Key AccessNetwork AccessFile SystemShell Access

Found a security issue?

Help protect the OpenClaw ecosystem by reporting malicious skills, vulnerabilities, or suspicious behavior.

Report Security Issue