DEV Community

Daniel Samer
Daniel Samer

Posted on • Originally published at clawhosters.com

300+ Trojanized GitHub Packages Target OpenClaw Docker Users

Over 300 malicious GitHub packages masquerading as OpenClaw Docker deployment tools were discovered distributing a LuaJIT-based Trojan. The malware steals credentials, captures screenshots, and sends everything to command-and-control servers in Frankfurt.

Netskope Threat Labs found the campaign in March 2026. The packages looked legitimate with spoofed names, READMEs, and star counts. They specifically targeted people searching for OpenClaw Docker setup guides.

What the malware does

  • Captures stored credentials from browsers and password managers
  • Takes periodic screenshots of victim machines
  • Exfiltrates API keys and tokens from environment variables
  • Maintains persistence through cron jobs and systemd services

How to protect yourself

  1. Only install packages from the official OpenClaw repository
  2. Verify package authors before running install commands
  3. Pin your Docker image digests instead of using ":latest"
  4. Audit your existing packages for anything you don't recognize

If you're not confident in your Docker security setup, managed hosting eliminates the supply chain risk entirely. Services like ClawHosters handle the infrastructure so you don't have to vet every dependency yourself.

Full breakdown with IOCs and detection rules: Read the full article

Top comments (0)