Avoid the Agentic Trojan Horse

TL;DR: Treat AI agent skills like dangerous executable code and read the instructions carefully.

Common AI Coding Mistakes ❌

Even careful developers can miss these details when rushing.

Problems this Article Addresses

How You Should be Using AI Coding Assistants

Benefits 🎯

Additional Context

AI Agents like OpenClaw have administrative system access. They can run shell commands and manage files. Attackers now flood registries with "skills" that appear to be helpful tools for YouTube, Solana, or Google Workspace. When you install these, you broaden your attack surface and grant an attacker a direct shell on your machine.

Sample Prompts

Bad prompt 🚫

Install the top-rated Solana wallet tracker skill 
and follow the setup instructions in the documentation.

Good prompt 👉

Download the source code for the Solana tracker skill
to my sandbox folder.

Wait until I review it line by line

Things to Keep in Mind ⚠️

OpenClaw often stores secrets in plaintext .env files. If you grant an agent access to your terminal, any malicious skill can read these secrets and exfiltrate them to a webhook in seconds.

Limitations ⚠️

Use this strategy when you host "agentic" AI platforms like OpenClaw or MoltBot locally. This tip doesn't replace endpoint protection. It adds a layer for AI-specific supply chain risks.

Conclusion 🏁

Your AI assistant is a powerful tool, but it can also become a high-impact control point for attackers. When you verify every skill, understand it, and isolate the runtime, you keep the "keys to your kingdom" safe. 🛡️

https://maximilianocontieri.com/ai-coding-tip-004-use-modular-skills?embedable=true

Isolate LLM tool execution with Kernel-enforced sandboxes.

Audit prompt injection risks in web-scraping agents.

Encrypt local configuration files for AI assistants.

More Information ℹ️

https://www.bleepingcomputer.com/news/security/malicious-moltbot-skills-used-to-push-password-stealing-malware/?embedable=true

https://hackernoon.com/code-smell-258-the-dangers-of-hardcoding-secrets?embedable=true

https://hackernoon.com/code-smell-284-encrypted-functions?embedable=true

https://hackernoon.com/code-smell-263-squatting?embedable=true

https://hackernoon.com/ai-coding-tip-003-force-read-only-planning?embedable=true

https://hackernoon.com/code-smell-300-package-hallucination?embedable=true

https://www.brodersendarknews.com/p/moltbook-riesgos-vibe-coding?embedable=true

https://securityscorecard.com/blog/beyond-the-hype-moltbots-real-risk-is-exposed-infrastructure-not-ai-superintelligence/?embedable=true

https://www.bitdefender.com/en-us/blog/labs/helpful-skills-or-hidden-payloads-bitdefender-labs-dives-deep-into-the-openclaw-malicious-skill-trap?embedable=true

https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html?embedable=true

Tools Referenced

https://openclaw.ai/?embedable=true

https://www.clawdex.io/?embedable=true

https://www.koi.ai/?embedable=true

Disclaimer 📢

The views expressed here are my own.

I am a human who writes as best as possible for other humans.

I use AI proofreading tools to improve some texts.

I welcome constructive criticism and dialogue.

I shape these insights through 30 years in the software industry, 25 years of teaching, and writing over 500 articles and a book.


This article is part of the AI Coding Tip series.