February 20, 2026 Source: The Hacker News 2 min read · 532 words

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Атака на ланцюг постачання Cline CLI 2.3.0 встановила OpenClaw на системи розробників

A stolen npm publish token just handed attackers the keys to a developer tool used by thousands. Cline CLI version 2.3.0 was compromised and weaponized to deliver OpenClaw malware directly onto developer machines—a textbook supply chain attack that's hitting real victims right now.

According to The Hacker News, this isn't theoretical. It's active, it's spreading, and it's happening through one of the most trusted distribution channels in the developer ecosystem.

Someone got their hands on an npm publish token for Cline CLI. That's the key that unlocks the ability to push updates to the package repository. And they didn't waste it.

Version 2.3.0 went live poisoned. Developers who installed or updated to that version unknowingly pulled down malicious code alongside the legitimate functionality they were counting on. The attack wasn't subtle—it was blunt force distribution through npm's trusted infrastructure.

Cline CLI is a command-line interface tool used across the developer community. It's the kind of utility that sits in your development pipeline, runs with your privileges, and gets trusted implicitly because it came from npm. Which makes this particularly nasty because the attack vector wasn't some obscure third-party dependency. It was the tool itself.

Under the Hood

The malware installed was OpenClaw. The real question is: what does it do? Malware with a name like that doesn't sound benign.

When malicious code gets injected at the package level like this, it executes with the same permissions as the developer running it. We're talking potential access to source code repositories, API keys, credentials stored locally, maybe even SSH keys. Everything that developer touches becomes a potential attack surface. And if that developer works at a company? The blast radius expands exponentially.

The infection happened during installation. No browser exploitation, no social engineering, no phishing link. Just a straightforward poisoned package that looked completely legitimate because it came through official channels.

The Fallout

How many machines got hit before this was detected? The Hacker News didn't specify exact numbers, but supply chain attacks like this can infect thousands before anyone realizes what's happening.

And here's what makes it worse: even if you've already patched, you need to assume compromise. Any system that ran 2.3.0 should be treated as potentially exposed. That means credential rotation, audit logs review, maybe forensic investigation depending on what that machine had access to.

Organizations using Cline CLI are now running triage. They're checking deployment logs, figuring out who updated when, assessing whether OpenClaw made it into their infrastructure. This is the expensive part of supply chain attacks—not the initial infection, but the cascading cleanup.

Protecting Yourself

First: check what version of Cline CLI you're running. If it's 2.3.0, you've got a problem. Update immediately to a patched version and assume your system was compromised.

Second: rotate your credentials. API keys, database passwords, repository access tokens—anything that machine had. Do it now.

Third: implement stricter controls around what npm packages can execute on your systems. Consider using npm audit regularly, lock dependency versions explicitly, and monitor for suspicious network activity from your build environments.

And frankly? This should have been caught sooner. Token security at npm needs serious attention. If an attacker can just steal a publish token and push malware to thousands of developers, the ecosystem has a problem that goes beyond any single incident.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →