February 19, 2026 Source: Dark Reading 2 min read · 574 words

Supply Chain Attack Secretly Installs OpenClaw for Cline Users

Атака на ланцюг постачання таємно встановлює OpenClaw для користувачів Cline

The npm package registry just became a crime scene again. A malicious actor compromised Cline version 2.3.0, injecting OpenClaw malware into a package trusted by thousands of developers—and nobody caught it immediately.

This isn't theoretical anymore. This is active, in-the-wild malware targeting your development workflow.

The Breach

According to Dark Reading, the compromised Cline package hit npm repositories and stayed live long enough to rack up over 4,000 downloads before someone noticed. That's four thousand separate machines—developer laptops, CI/CD pipelines, build servers—potentially running hostile code.

Cline is a legitimate, widely-used npm package. Developers rely on it. They don't scrutinize every update with forensic intensity. They run npm install or let their dependency managers auto-update, and they expect the code they're pulling down is what it's supposed to be.

That assumption just bit them.

The attack vector here is textbook supply chain sabotage: compromise a trusted dependency, wait for adoption, execute payload. It works because npm's trust model hinges on the assumption that package maintainers aren't compromised. An attacker who gains control of those credentials—through credential theft, social engineering, or account takeover—can push whatever they want downstream to your build environment.

Under the Hood

So what exactly did OpenClaw do?

The malware installed silently as part of the legitimate package installation process. This is a code vulnerability example of how dangerous supply chain attacks can be: the malicious code executed with the same permissions as the package installation itself, which often runs with elevated privileges in development and CI/CD environments.

That means OpenClaw didn't need to ask permission. It ran during installation. It could establish persistence, create backdoors, exfiltrate data from the developer's environment, or use their machine as a jumping-off point for lateral movement into their organization's network.

And here's the kicker: developers might not have known it happened. Installation scripts are expected to do things. They install dependencies, compile native modules, run setup routines. A malicious script sitting in that process looks like business-as-usual noise.

The Fallout

4,000 downloads. That's not a huge number for a popular npm package, but it's plenty of impact for a malware campaign targeting developers.

Organizations that pulled in Cline 2.3.0 need to assume compromise. That means audit logs for what the malware accessed, what it exfiltrated, what credentials it might have touched. If your developers ran this on machines with SSH keys, API tokens, or database credentials, those are potentially burned.

This is particularly nasty because the blast radius extends beyond just the compromised machines. A developer's laptop with stolen credentials is a doorway into production systems, private repositories, cloud infrastructure.

The real question is: how many organizations won't realize they pulled in the malicious version until it's too late?

Protecting Yourself

First: check your supply chain. If you installed Cline between the package's compromise date and removal, audit what that package touched. Review access logs for any suspicious activity. Rotate any credentials that lived on those machines.

Second: enable dependency scanning. Tools that flag known vulnerabilities, suspicious package metadata, or unusual code changes can catch this stuff. They won't catch zero-days, but they'll catch the obvious compromises.

Third: use lock files and pin versions. Don't auto-update critical dependencies. Review changelog and security advisories before upgrading. A few minutes of caution beats cleaning up a breach.

And frankly? Organizations should be running static analysis and dynamic sandboxing on suspicious packages before adding them to production builds. It's not perfect, but it's better than blind trust.

This attack isn't unique. It's become the supply chain norm. The only defense is treating every dependency like potential malware until you've verified otherwise.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →