Back to all articles

Supply Chain Compromise in Cline v2.3.0 Leads to Unauthorized OpenClaw Installation

Security researchers identified a supply chain compromise in the Cline npm package version 2.3.0, which briefly distributed an unauthorized installation of the OpenClaw AI agent. This report details the technical mechanism of the compromise, the risks associated with the installed software, and the necessary remediation steps for affected development environments.

Triage Security Media Team
3 min read

Security monitoring systems recently detected an anomaly involving the npm package for Cline, a widely used open-source AI coding tool. For a window of approximately eight hours, version 2.3.0 of the package contained an unauthorized post-install hook that deployed OpenClaw, an autonomous AI agent, alongside the legitimate software.

While the unauthorized component is not traditional malware designed for destruction, its unapproved installation introduces significant security risks to development environments. The incident highlights the critical importance of verifying software provenance and securing automated build pipelines against manipulation.

Technical Analysis of the Compromise

The compromise originated including a vulnerability in the project's GitHub Actions workflow. Security researcher Adnan Khan identified a prompt injection flaw within Cline’s "Claude Issue Triage" workflow. This workflow was designed to use an AI agent to automatically categorize and respond and GitHub issues.

Khan demonstrated that the workflow lacked sufficient isolation, allowing an external party to inject commands via issue titles. These commands could manipulate the build environment. Specifically, the vulnerability allowed access to the GitHub Actions cache and nightly build processes.

Following Khan’s disclosure, an unauthorized actor—distinct including the researcher—leveraged similar techniques and access publication secrets. The actor obtained tokens for the Visual Studio Code Marketplace, OpenVSX, and npm. Using these credentials, they published the compromised version 2.3.0, which included the script to download and install OpenClaw.

Henrik Plate, a security researcher with Endor Labs, analyzed the compromised package. He confirmed that the postinstall script was engineered to silently download the OpenClaw binary. Plate noted that while the payload itself was not inherently malicious code, the method of distribution bypassed user consent and standard trust mechanisms.

Risk Assessment of the Unauthorized Payload

Although OpenClaw is a functional AI tool rather than a destructive virus, its unauthorized presence on a developer's system presents a "high-priority" security concern.

Sai Likhith Paradarami, a software engineer at StepSecurity, analyzed the behavior of the installed software. The investigation revealed that OpenClaw establishes a persistent Gateway daemon running as a background WebSocket server. This configuration grants the software broad permissions, including:

  • Full Disk Access: The ability to read and modify files across the host system.

  • Remote Execution: A persistent channel that can execute tasks on behalf of the user.

  • Network Communication: Established connections that could theoretically be used for data exfiltration or command and control.

Paradarami assessed that this design creates a persistent foothold on the system. If an unauthorized actor controls the OpenClaw instance, they could potentially access sensitive development secrets and proprietary code without the user's knowledge.

Remediation and Structural Improvements

The maintainers of Cline responded rapidly to the incident. They have released version 2.4.0, which removes the compromised components and secures the build pipeline.

Immediate Actions for Users:

  • Update Immediately: Users running Cline v2.3.0 should upgrade to v2.4.0 or later immediately.

  • Inspect Environments: Developers who downloaded Cline during the affected window should check their systems for unauthorized OpenClaw installations or unexpected background processes.

  • Revoke Credentials: As a precaution, consider rotating any API keys or secrets that were active in the environment while the compromised version was installed.

Structural Fixes: To prevent recurrence, the Cline team has revoked the compromised publication tokens. Furthermore, they have transitioned the publishing process to use OpenID Connect (OIDC) provenance via GitHub Actions. This method eliminates the need for static, long-lived secrets, significantly reducing the risk of credential theft in future workflows.

This incident serves as a case study in the complexities of securing automated AI workflows. It demonstrates that prompt injection is not merely a functional issue but a viable vector for infrastructure compromise when AI agents are granted access to build pipelines.