▶
Collected Feb 16, 2026
VIDEO
- If you want more, this curated tracker and doc showcase often link out to fresh YouTube uploads about OpenClaw: the official Showcase page and third‑party aggregators (TubeScout) list dozens of demos, reviews, and tutorials. (docs.openclaw.ai)
docs.openclaw.ai
Feb 16, 2026
- LFI in BlueBubbles media path handling — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-rwj8-p9vq-25gv — Date: Feb 16, 2026. High-severity LFI allowed reading arbitrary local files via attacker-controlled mediaPath in the BlueBubbles extension; mitigated by enforcing allowed roots in ≥ 2026.2.14. (github.com)
- Two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m — Date: Feb 16, 2026. High-severity SSRF issues in Feishu media fetching/markdown image handling; fixed by routing through hardened helpers in ≥ 2026.2.14. (github.com)
- OpenClaw Bug Enables One‑Click Remote Code Execution via Malicious Link (CVE‑2026‑25253) — URL: https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html — Date: Feb 2, 2026. Token‑exfiltration via unvalidated gatewayUrl and WebSocket origin let attackers achieve 1‑click RCE; fixed in 2026.1.29, with CVSS 8.8. (thehackernews.com)
github.com
Feb 16, 2026
- Two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m — Date: Feb 16, 2026. High-severity SSRF issues in Feishu media fetching/markdown image handling; fixed by routing through hardened helpers in ≥ 2026.2.14. (github.com)
- OpenClaw Bug Enables One‑Click Remote Code Execution via Malicious Link (CVE‑2026‑25253) — URL: https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html — Date: Feb 2, 2026. Token‑exfiltration via unvalidated gatewayUrl and WebSocket origin let attackers achieve 1‑click RCE; fixed in 2026.1.29, with CVSS 8.8. (thehackernews.com)
github.com
Feb 15, 2026
- OpenClaw founder Peter Steinberger is joining OpenAI — URL: https://www.theverge.com/ai-artificial-intelligence/879623/openclaw-founder-peter-steinberger-joins-openai — Date: Feb 15, 2026. Sam Altman announced Steinberger’s hire to help drive a multi‑agent future; OpenClaw will continue as an open‑source project in a foundation supported by OpenAI. (theverge.com)
- OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills — URL: https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html — Date: Feb 8, 2026. New VirusTotal‑backed pipeline hashes, scans, and auto‑approves/blocks skills, while maintainers caution scanning isn’t a silver bullet. (thehackernews.com)
theverge.com
Feb 14, 2026
- Remote Code Execution via Node Invoke Approval Bypass in Gateway — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58 — Date: Feb 14, 2026. Critical GHSA details an RCE path where authenticated gateway clients could bypass exec approvals in node.invoke; patched in 2026.2.14 with stricter parameter allowlisting and approval checks. (github.com)
- OC-02: Gateway /tools/invoke tool escalation + ACP permission auto-approval — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-943q-mwmv-hhvh — Date: Feb 14, 2026. High-severity advisory hardens HTTP /tools/invoke defaults and ACP permission behavior to prevent escalation from single-tool calls to full session control; fixed in 2026.2.14. (github.com)
- LFI in BlueBubbles media path handling — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-rwj8-p9vq-25gv — Date: Feb 16, 2026. High-severity LFI allowed reading arbitrary local files via attacker-controlled mediaPath in the BlueBubbles extension; mitigated by enforcing allowed roots in ≥ 2026.2.14. (github.com)
- Two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m — Date: Feb 16, 2026. High-severity SSRF issues in Feishu media fetching/markdown image handling; fixed by routing through hardened helpers in ≥ 2026.2.14. (github.com)
- OpenClaw Bug Enables One‑Click Remote Code Execution via Malicious Link (CVE‑2026‑25253) — URL: https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html — Date: Feb 2, 2026. Token‑exfiltration via unvalidated gatewayUrl and WebSocket origin let attackers achieve 1‑click RCE; fixed in 2026.1.29, with CVSS 8.8. (thehackernews.com)
github.com
Feb 14, 2026
- OC-02: Gateway /tools/invoke tool escalation + ACP permission auto-approval — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-943q-mwmv-hhvh — Date: Feb 14, 2026. High-severity advisory hardens HTTP /tools/invoke defaults and ACP permission behavior to prevent escalation from single-tool calls to full session control; fixed in 2026.2.14. (github.com)
- LFI in BlueBubbles media path handling — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-rwj8-p9vq-25gv — Date: Feb 16, 2026. High-severity LFI allowed reading arbitrary local files via attacker-controlled mediaPath in the BlueBubbles extension; mitigated by enforcing allowed roots in ≥ 2026.2.14. (github.com)
- Two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension — URL: https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m — Date: Feb 16, 2026. High-severity SSRF issues in Feishu media fetching/markdown image handling; fixed by routing through hardened helpers in ≥ 2026.2.14. (github.com)
- OpenClaw Bug Enables One‑Click Remote Code Execution via Malicious Link (CVE‑2026‑25253) — URL: https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html — Date: Feb 2, 2026. Token‑exfiltration via unvalidated gatewayUrl and WebSocket origin let attackers achieve 1‑click RCE; fixed in 2026.1.29, with CVSS 8.8. (thehackernews.com)
github.com
Feb 14, 2026
- openclaw 2026.2.13 — URL: https://github.com/openclaw/openclaw/releases/tag/v2026.2.13 — Date: Feb 14, 2026. Adds Discord voice message support and presence controls, Slack thread‑ownership gating, first‑class Hugging Face Inference provider, and reliability fixes across outbound delivery and channel adapters. (github.com)
github.com
▶
February 13, 2026
VIDEO
- Why is OpenClaw Becoming So Popular Right Now? — https://www.youtube.com/watch?v=V5YwnB_IhEo — OrcDev — February 13, 2026 — Fast commentary on the project’s sudden growth, the numbers behind it, and why the hype might stick. (bitbuddies.me)
bitbuddies.me
▶
February 12, 2026
VIDEO
- I finally understand OpenClaw (and you should too) — https://www.youtube.com/watch?v=lSNwO0M7Ik0 — Ras Mic — February 12, 2026 — A creator explains his OpenClaw setup and how it’s running parts of his business. (bitbuddies.me)
bitbuddies.me
▶
February 12, 2026
VIDEO
- Hawaii AI Roundup: GLM5, Composer 1.5, OpenClaw — https://www.youtube.com/watch?v=ZCNoj9siF2I — Ray Fernando — February 12, 2026 — A weekly news roundup with a segment on OpenClaw’s momentum, what to try, and what to skip. (bitbuddies.me)
bitbuddies.me
▶
Feb 12, 2026
VIDEO
- OpenClaw founder joins OpenAI — news commentary roundups that include OpenClaw context (example: Hawaii AI Roundup above on Feb 12, 2026), plus broader coverage confirming the Feb 15–16, 2026 announcements for additional context. (theverge.com)
theverge.com
Feb 8, 2026
- OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills — URL: https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html — Date: Feb 8, 2026. New VirusTotal‑backed pipeline hashes, scans, and auto‑approves/blocks skills, while maintainers caution scanning isn’t a silver bullet. (thehackernews.com)
thehackernews.com
▶
February 4, 2026
VIDEO
- OpenClaw Full Tutorial for Beginners – How to Set Up and Use OpenClaw (ClawdBot / MoltBot) — https://www.youtube.com/watch?v=n1sfrc-RjyM — freeCodeCamp.org — February 4, 2026 — A 55‑minute beginner course covering installation, setup, skills, multi‑agent features, and Docker‑based security practices. (ceppek.com)
ceppek.com
Feb 4, 2026
- Moltbot is now OpenClaw — but watch out, malicious ‘skills’ are still trying to trick victims — URL: https://www.techradar.com/pro/moltbot-is-now-openclaw-but-watch-out-malicious-skills-are-still-trying-to-trick-victims-into-spreading-malware — Date: Feb 4, 2026. TechRadar highlights rebrand‑driven impersonation risks and warns that unsandboxed skills can execute with broad local access. (techradar.com)
- AI agents now have their own Reddit‑style social network, and it’s getting weird fast — URL: https://arstechnica.com/information-technology/2026/01/ai-agents-now-have-their-own-reddit-style-social-network-and-its-getting-weird-fast/ — Date: Jan 30, 2026. Ars Technica covers Moltbook, an OpenClaw‑adjacent agent‑only social network, and the accompanying security/privacy weirdness. (arstechnica.com)
- OpenClaw’s AI ‘skill’ extensions are a security nightmare — URL: https://www.theverge.com/news/874011/openclaw-ai-skill-clawhub-extensions-security-nightmare — Date: Feb 4, 2026. The Verge details hundreds of malicious ClawHub add‑ons and early mitigations (publisher age minimum, reporting). (theverge.com)
techradar.com
Feb 4, 2026
- OpenClaw’s AI ‘skill’ extensions are a security nightmare — URL: https://www.theverge.com/news/874011/openclaw-ai-skill-clawhub-extensions-security-nightmare — Date: Feb 4, 2026. The Verge details hundreds of malicious ClawHub add‑ons and early mitigations (publisher age minimum, reporting). (theverge.com)
theverge.com
Feb 2, 2026
- OpenClaw Bug Enables One‑Click Remote Code Execution via Malicious Link (CVE‑2026‑25253) — URL: https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html — Date: Feb 2, 2026. Token‑exfiltration via unvalidated gatewayUrl and WebSocket origin let attackers achieve 1‑click RCE; fixed in 2026.1.29, with CVSS 8.8. (thehackernews.com)
thehackernews.com
Feb 2, 2026
- OpenClaw patches one‑click RCE as “security Whac‑A‑Mole” continues — URL: https://www.theregister.com/2026/02/02/openclaw_security_issues/ — Date: Feb 2, 2026. The Register summarizes the 1‑click RCE chain and ongoing hardening across the ecosystem. (theregister.com)
- Malicious OpenClaw ‘skill’ targets crypto users on ClawHub — URL: https://www.tomshardware.com/tech-industry/cyber-security/malicious-moltbot-skill-targets-crypto-users-on-clawhub — Date: Feb 1, 2026. Tom’s Hardware reports at least 14 malicious skills posed as crypto tools, using social engineering to deliver malware on Windows/macOS. (tomshardware.com)
- Moltbot is now OpenClaw — but watch out, malicious ‘skills’ are still trying to trick victims — URL: https://www.techradar.com/pro/moltbot-is-now-openclaw-but-watch-out-malicious-skills-are-still-trying-to-trick-victims-into-spreading-malware — Date: Feb 4, 2026. TechRadar highlights rebrand‑driven impersonation risks and warns that unsandboxed skills can execute with broad local access. (techradar.com)
- AI agents now have their own Reddit‑style social network, and it’s getting weird fast — URL: https://arstechnica.com/information-technology/2026/01/ai-agents-now-have-their-own-reddit-style-social-network-and-its-getting-weird-fast/ — Date: Jan 30, 2026. Ars Technica covers Moltbook, an OpenClaw‑adjacent agent‑only social network, and the accompanying security/privacy weirdness. (arstechnica.com)
- OpenClaw’s AI ‘skill’ extensions are a security nightmare — URL: https://www.theverge.com/news/874011/openclaw-ai-skill-clawhub-extensions-security-nightmare — Date: Feb 4, 2026. The Verge details hundreds of malicious ClawHub add‑ons and early mitigations (publisher age minimum, reporting). (theverge.com)
theregister.com
Feb 1, 2026
- Malicious OpenClaw ‘skill’ targets crypto users on ClawHub — URL: https://www.tomshardware.com/tech-industry/cyber-security/malicious-moltbot-skill-targets-crypto-users-on-clawhub — Date: Feb 1, 2026. Tom’s Hardware reports at least 14 malicious skills posed as crypto tools, using social engineering to deliver malware on Windows/macOS. (tomshardware.com)
- Moltbot is now OpenClaw — but watch out, malicious ‘skills’ are still trying to trick victims — URL: https://www.techradar.com/pro/moltbot-is-now-openclaw-but-watch-out-malicious-skills-are-still-trying-to-trick-victims-into-spreading-malware — Date: Feb 4, 2026. TechRadar highlights rebrand‑driven impersonation risks and warns that unsandboxed skills can execute with broad local access. (techradar.com)
- AI agents now have their own Reddit‑style social network, and it’s getting weird fast — URL: https://arstechnica.com/information-technology/2026/01/ai-agents-now-have-their-own-reddit-style-social-network-and-its-getting-weird-fast/ — Date: Jan 30, 2026. Ars Technica covers Moltbook, an OpenClaw‑adjacent agent‑only social network, and the accompanying security/privacy weirdness. (arstechnica.com)
- OpenClaw’s AI ‘skill’ extensions are a security nightmare — URL: https://www.theverge.com/news/874011/openclaw-ai-skill-clawhub-extensions-security-nightmare — Date: Feb 4, 2026. The Verge details hundreds of malicious ClawHub add‑ons and early mitigations (publisher age minimum, reporting). (theverge.com)
tomshardware.com
▶
January 30, 2026
VIDEO
- “OpenClaw” was known as “Clawdbot,” briefly “Moltbot,” then “OpenClaw” from January 30, 2026; many recent videos still use the older names but are about the same open‑source agent. (theverge.com)
- If you want more, this curated tracker and doc showcase often link out to fresh YouTube uploads about OpenClaw: the official Showcase page and third‑party aggregators (TubeScout) list dozens of demos, reviews, and tutorials. (docs.openclaw.ai)
theverge.com
Jan 30, 2026
- AI agents now have their own Reddit‑style social network, and it’s getting weird fast — URL: https://arstechnica.com/information-technology/2026/01/ai-agents-now-have-their-own-reddit-style-social-network-and-its-getting-weird-fast/ — Date: Jan 30, 2026. Ars Technica covers Moltbook, an OpenClaw‑adjacent agent‑only social network, and the accompanying security/privacy weirdness. (arstechnica.com)
- OpenClaw’s AI ‘skill’ extensions are a security nightmare — URL: https://www.theverge.com/news/874011/openclaw-ai-skill-clawhub-extensions-security-nightmare — Date: Feb 4, 2026. The Verge details hundreds of malicious ClawHub add‑ons and early mitigations (publisher age minimum, reporting). (theverge.com)
arstechnica.com
▶
January 27, 2026
VIDEO
- Clawdbot/moltbot Clearly Explained (and how to use it) — https://www.youtube.com/watch?v=U8kXfk8enrY — Greg Isenberg — January 27, 2026 — A guided explanation and demo of turning the agent into a proactive “AI employee,” plus security mindset tips. (skool.com)
skool.com
▶
January 27, 2026
VIDEO
- Clawdbot Malware — https://www.youtube.com/watch?v=7GS6Xs4hdvg — John Hammond — January 27, 2026 — A security deep‑dive into a fake “Clawdbot Agent” VS Code extension used to drop RAT malware, with hands‑on analysis. (nohackme.com)
nohackme.com
▶
January 27, 2026
VIDEO
- clawdbot is a security nightmare — https://www.youtube.com/watch?v=kSno1-xOjwI — Low Level — January 27, 2026 — A critical look at the agent’s security model (prompt‑injection risk, broad permissions, and unsafe defaults) and safer ways to test it. (discuss.privacyguides.net)
discuss.privacyguides.net
▶
January 26, 2026
VIDEO
- I Played with Clawdbot all Weekend – it’s insane. — https://www.youtube.com/watch?v=MUDvwqJWWIw — Matthew Berman — January 26, 2026 — A hands‑on review showing setup, real‑world integrations, and why the agent feels different from chatbots. (youtu.be)
youtu.be
▶
January 9, 2026
VIDEO
- ClawdBot: The self-hosted AI that Siri should have been (Full setup) — https://www.youtube.com/watch?v=SaWSPZoPX34 — VelvetShark — January 9, 2026 — A full walkthrough showing how to self‑host the assistant and wire it into your daily tools. (docs.openclaw.ai)
docs.openclaw.ai