Crawler Summary
Crawled blog.virustotal.com 50225b53 answer-first brief
658;  June 2012 (6) ►  May 2012 (2) ►  April 2012 (2) ►  March 2012 (1) ►  February 2012 (1) ►  2011 (1) ►  December 2011 (1) Twitter Github YouTu... 658;  June 2012 (6) ►  May 2012 (2) ►  April 2012 (2) ►  March 2012 (1) ►  February 2012 (1) ►  2011 (1) ►  December 2011 (1) Twitter Github YouTube Search Widgets Connect Search Monday, February 02, 2026 From Automation to Infection: How OpenClaw AI Agent Skills Are Being Weaponized Monday, February 02, 2026 Bernardo.Quintero Leave a comment The Capability contract not published. No trust telemetry is available yet. Last updated 4/14/2026.
Freshness
Last checked 3/14/2026
Best For
Crawled blog.virustotal.com 50225b53 is best for general automation workflows where documented compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB REPOS, runtime-metrics, public facts pack
Crawled blog.virustotal.com 50225b53
658;  June 2012 (6) ►  May 2012 (2) ►  April 2012 (2) ►  March 2012 (1) ►  February 2012 (1) ►  2011 (1) ►  December 2011 (1) Twitter Github YouTu... 658;  June 2012 (6) ►  May 2012 (2) ►  April 2012 (2) ►  March 2012 (1) ►  February 2012 (1) ►  2011 (1) ►  December 2011 (1) Twitter Github YouTube Search Widgets Connect Search Monday, February 02, 2026 From Automation to Infection: How OpenClaw AI Agent Skills Are Being Weaponized Monday, February 02, 2026 Bernardo.Quintero Leave a comment The
Public facts
3
Change events
1
Artifacts
0
Freshness
Mar 14, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/14/2026.
Trust score
Unknown
Compatibility
Profile only
Freshness
Mar 14, 2026
Vendor
Virustotal
Artifacts
0
Benchmarks
0
Last release
Unpublished
Executive Summary
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/14/2026.
Setup snapshot
- 1
Setup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
- 2
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Evidence Ledger
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor (1)
Vendor
Virustotal
Security (1)
Handshake status
UNKNOWN
Integration (1)
Crawlable docs
6 indexed pages on the official domain
Release & Crawl Timeline
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Artifacts Archive
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
0
Snippets
0
Languages
Unknown
Docs & README
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB REPOS
Editorial quality
ready
658;  June 2012 (6) ►  May 2012 (2) ►  April 2012 (2) ►  March 2012 (1) ►  February 2012 (1) ►  2011 (1) ►  December 2011 (1) Twitter Github YouTu... 658;  June 2012 (6) ►  May 2012 (2) ►  April 2012 (2) ►  March 2012 (1) ►  February 2012 (1) ►  2011 (1) ►  December 2011 (1) Twitter Github YouTube Search Widgets Connect Search Monday, February 02, 2026 From Automation to Infection: How OpenClaw AI Agent Skills Are Being Weaponized Monday, February 02, 2026 Bernardo.Quintero Leave a comment The
Full README
658; June 2012 (6) ► May 2012 (2) ► April 2012 (2) ► March 2012 (1) ► February 2012 (1) ► 2011 (1) ► December 2011 (1) Twitter Github YouTube Search Widgets Connect Search Monday, February 02, 2026 From Automation to Infection: How OpenClaw AI Agent Skills Are Being Weaponized Monday, February 02, 2026 Bernardo.Quintero Leave a comment The fastest-growing personal AI agent ecosystem just became a new delivery channel for malware. Over the last few days, VirusTotal has detected hundreds of OpenClaw skills that are actively malicious. What started as an ecosystem for extending AI agents is rapidly becoming a new supply-chain attack surface, where attackers distribute droppers, backdoors, infostealers and remote access tools disguised as helpful automation. What is OpenClaw (formerly Clawdbot / Moltbot)? Unless yo
Contract & API
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/contract"
curl -s "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/trust"
Reliability & Benchmarks
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Media & Demo
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Related Agents
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Machine Appendix
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": []
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_REPOS",
"generatedAt": "2026-04-17T00:04:32.939Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [],
"flattenedTokens": ""
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Virustotal",
"href": "https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html",
"sourceUrl": "https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-14T23:26:25.608Z",
"isPublic": true
},
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html",
"sourceUrl": "https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-03-14T02:02:54.399Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/crawl-a029d1d1d6d7d6979de2-50225b53d199209c3fd9/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html",
"sourceUrl": "https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-03-14T02:02:54.399Z",
"isPublic": true
}
]