Viral AI Assistant ‘Clawdbot’ Exposes 1,000+ Users via Plaintext Vulnerability

The viral open-source AI assistant Clawdbot, marketed as a “local-first” alternative to ChatGPT, is hemorrhaging sensitive user data due to a critical architectural oversight. Security researcher Jamieson O’Reilly identified over 1,000 instances of the bot’s control interface exposed to the public internet, granting attackers full access to private Telegram messages, Anthropic API keys, and workspace credentials.

The vulnerability is not a traditional bug, but a failure of default security configurations combined with reckless data storage. While Clawdbot pitches itself as a privacy-focused tool that runs on your own hardware (e.g., a Mac Mini), it stores authentication tokens and conversation history in plaintext files like MEMORY.md and clawdbot.json. When users unknowingly expose the bot’s gateway port (default: 3000 or 18789) via reverse proxies, these files become readable to anyone running a simple Shodan scan.

The “Cognitive Context” Breach

The implications for crypto operators using Clawdbot for automated trading alerts or discord management are severe. Hudson Rock Research dubbed the threat “Cognitive Context Theft.” Unlike a standard wallet drain, this vector exposes the psychological dossier of the user, ongoing deal negotiations, trust networks, and unencrypted seed phrases potentially typed into chat windows.

Files like MEMORY.md provide a psychological dossier of the user… enabling perfect social engineering. This isn’t just data theft; it is identity, agency, and perception compromise.

The GitHub repository reveals that the bot requires broad permissions to function, including file system access and shell execution. This turns a compromised instance into a remote command center for attackers. If an attacker gains write access to the exposed gateway, they can inject malicious instructions, or “Prompt Injections”, into the AI’s logic loop. A harmless-looking email summary request could be hijacked to exfiltrate the user’s entire ~/.clawdbot/ directory.

Market Impact

While Clawdbot has no native token to short, the incident serves as a bellwether for the “Agentic AI” sector. Projects integrating similar autonomous agents into DeFi workflows (e.g., for executing on-chain swaps via natural language) face immediate scrutiny. Developers running local AI agents are advised to firewall their gateway ports immediately and rotate all API keys stored within the assistant’s memory.

> ABOUT_THE_AUTHOR _

Amir Rocha

// Crypto News Reporter

I’m Amir Rocha, a reporter who believes you shouldn't need a computer science degree to understand the future of money. I spend my days translating technical developments from Zero-Knowledge rollups into clear, actionable insights for SEC filings. After 8 years in the blockchain space, I’ve learned that the most important story isn't the price, but the technology underneath. I write to help you spot the difference between genuine innovation and a marketing gimmick

VIEW_PROFILE >>