News: 1771617910

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

AI coding assistant Cline compromised to create more OpenClaw chaos

(2026/02/20)


Someone compromised open source AI coding assistant Cline CLI's npm package earlier this week in an odd [1]supply chain attack that secretly installed OpenClaw on developers' machines without their knowledge.

The incident occurred on Tuesday, when an "unauthorized party" used a compromised token to publish an update to Cline CLI on its npm registry that installs OpenClaw - the [2]AI agent platform slash [3]security nightmare - on users' computers when they install cline@2.3.0.

"Users who installed Cline CLI cline@2.3.0 during the approximately 8-hour window between 3:26 AM PT and 11:30 AM PT on February 17 will have openclaw globally installed," Cline's maintainers [4]said in a security advisory. "The openclaw package is a legitimate open source project and is not malicious, but its installation was not authorized or intended."

[5]

The maintainers also revoked the compromised token, and added that "npm publishing now uses OIDC provenance via GitHub Actions."

[6]

[7]

Anyone who installed Cline during this time period should update to a fixed version (2.4.0 or higher) and check their environment for a surprise OpenClaw installation.

Earlier this month, security researcher Adnan Khan found and disclosed a prompt injection vulnerability (since fixed) to Cline that could be abused for this exact purpose.

[8]More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster

[9]Supply chain attacks now fuel a 'self-reinforcing' cybercrime economy

[10]CEO spills the Tea about massive token farming campaigns

[11]AI agents can't yet pull off fully autonomous cyberattacks – but they are already very helpful to crims

"To make sure it's clear in the midst of the NPM package situation: I did NOT conduct overt testing on Cline's repository," Khan [12]said in an update to his research.

"I conducted my PoC on a mirror of Cline to confirm the prompt injection vulnerability," he added. "A different actor found my PoC on my test repository and used it to directly attack Cline and obtain the publication credentials."

[13]

Microsoft did [14]note a "small but noticeable uptick in installations of OpenClaw initiated by Cline CLI installation script" during the eight-hour supply chain incident on February 17.

StepSecurity, meanwhile, [15]reported that the compromised version was downloaded about 4,000 times before the package maintainers deprecated it.

We don't know who's responsible for slipping OpenClaw into Cline's npm registry - and for what purposes other than creating more chaotic AI agents. ®

Get our [16]Tech Resources



[1] https://www.theregister.com/2026/02/12/supply_chain_attacks/

[2] https://www.theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/

[3] https://www.theregister.com/2026/02/03/openclaw_security_problems/

[4] https://github.com/cline/cline/security/advisories/GHSA-9ppg-jx86-fqw7

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZjnjzTVGpasd3I8Rghe7wAAAtY&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZjnjzTVGpasd3I8Rghe7wAAAtY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZjnjzTVGpasd3I8Rghe7wAAAtY&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[8] https://www.theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/

[9] https://www.theregister.com/2026/02/12/supply_chain_attacks/

[10] https://www.theregister.com/2025/12/17/tea_ceo_fends_off_token_farmers/

[11] https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/

[12] https://adnanthekhan.com/posts/clinejection/

[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZjnjzTVGpasd3I8Rghe7wAAAtY&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[14] https://x.com/MsftSecIntel/status/2024575596941263040

[15] https://www.endorlabs.com/learn/supply-chain-attack-targeting-cline-installs-openclaw

[16] https://whitepapers.theregister.com/



Microslop

elsergiovolador

This reminds me of Microsoft not so secretly installing Coidiot on everyone's machines.

curtation, n.:
The enforced compression of a string in the fixed-length field
environment.
The problem of fitting extremely variable-length strings such as names,
addresses, and item descriptions into fixed-length records is no trivial
matter. Neglect of the subtle art of curtation has probably alienated more
people than any other aspect of data processing. You order Mozart's "Don
Giovanni" from your record club, and they invoice you $24.95 for MOZ DONG.
The witless mapping of the sublime onto the ridiculous! Equally puzzling is
the curtation that produces the same eight characters, THE BEST, whether you
order "The Best of Wagner", "The Best of Schubert", or "The Best of the Turds".
Similarly, wine lovers buying from computerized wineries twirl their glasses,
check their delivery notes, and inform their friends, "A rather innocent,
possibly overtruncated CAB SAUV 69 TAL." The squeezing of fruit into 10
columns has yielded such memorable obscenities as COX OR PIP. The examples
cited are real, and the curtational methodology which produced them is still
with us.

MOZ DONG n.
Curtation of Don Giovanni by Wolfgang Amadeus Mozart and Lorenzo da
Ponte, as performed by the computerized billing ensemble of the Internat'l
Preview Society, Great Neck (sic), N.Y.
-- Stan Kelly-Bootle, "The Devil's DP Dictionary"