ClawWorm: Self-Propagating Attacks Across LLM Agent Ecosystems
Yihao Zhang 1, Zeming Wei 2, Xiaokun Luan 1, Chengcan Wu 3, Zhixin Zhang 1, Jiangrong Wu 4, Haolin Wu 1, Huanran Chen 5, Jun Sun 1, Meng Sun 1
Published on arXiv
2603.15727
AI Supply Chain Attacks
OWASP ML Top 10 — ML06
Prompt Injection
OWASP LLM Top 10 — LLM01
Excessive Agency
OWASP LLM Top 10 — LLM08
Key Finding
Achieves 0.85 overall attack success rate with 1.00 conditional propagation rate (166/166) and sustained 5-hop propagation (0.91 per-hop ASR) on OpenClaw testbed
ClawWorm
Novel technique introduced
Autonomous LLM-based agents increasingly operate as long-running processes forming densely interconnected multi-agent ecosystems, whose security properties remain largely unexplored. In particular, OpenClaw, an open-source platform with over 40{,}000 active instances, has stood out recently with its persistent configurations, tool-execution privileges, and cross-platform messaging capabilities. In this work, we present ClawWorm, the first self-replicating worm attack against a production-scale agent framework, achieving a fully autonomous infection cycle initiated by a single message: the worm first hijacks the victim's core configuration to establish persistent presence across session restarts, then executes an arbitrary payload upon each reboot, and finally propagates itself to every newly encountered peer without further attacker intervention. We evaluate the attack on a controlled testbed across three distinct infection vectors and three payload types, demonstrating high success rates in end-to-end infection, sustained multi-hop propagation, and payload independence from the worm mechanism. We analyse the architectural root causes underlying these vulnerabilities and propose defence strategies targeting each identified trust boundary. Code and samples will be released upon completion of responsible disclosure.
Key Contributions
- First self-replicating worm attack on production-scale LLM agent ecosystem (OpenClaw, 40K+ instances)
- Dual-anchor persistence mechanism: hijacks agent configuration files to survive restarts and autonomously propagate to peers
- Broadcast hypergraph propagation enabling zero-click parallel infection through group messaging channels
- Supply chain amplification via malicious skill package installation from ClawHub marketplace
🛡️ Threat Analysis
Exploits supply chain by compromising agents to install attacker-controlled skill packages from ClawHub marketplace, achieving remote code execution through framework plugins.