Autonomous LLM brokers like OpenClaw are shifting the paradigm from passive assistants to proactive entities able to executing advanced, long-horizon duties by means of high-privilege system entry. Nonetheless, a safety evaluation analysis report from Tsinghua College and Ant Group reveals that OpenClaw’s ‘kernel-plugin’ structure—anchored by a pi-coding-agent serving because the Minimal Trusted Computing Base (TCB)—is susceptible to multi-stage systemic dangers that bypass conventional, remoted defenses. By introducing a five-layer lifecycle framework masking initialization, enter, inference, choice, and execution, the analysis crew demonstrates how compound threats like reminiscence poisoning and talent provide chain contamination can compromise an agent’s total operational trajectory.
OpenClaw Structure: The pi-coding-agent and the TCB
OpenClaw makes use of a ‘kernel-plugin’ structure that separates core logic from extensible performance. The system’s Trusted Computing Base (TCB) is outlined by the pi-coding-agent, a minimal core liable for reminiscence administration, activity planning, and execution orchestration. This TCB manages an extensible ecosystem of third-party plugins—or ‘skills’—that allow the agent to carry out high-privilege operations equivalent to automated software program engineering and system administration. A important architectural vulnerability recognized by the analysis crew is the dynamic loading of those plugins with out strict integrity verification, which creates an ambiguous belief boundary and expands the system’s assault floor.

✓ Signifies efficient threat mitigation by the safety layer
× Denotes uncovered dangers by the safety layer
A Lifecycle-Oriented Risk Taxonomy
The analysis crew systematizes the menace panorama throughout 5 operational phases that align with the agent’s useful pipeline:
- Stage I (Initialization): The agent establishes its operational surroundings and belief boundaries by loading system prompts, safety configurations, and plugins.
- Stage II (Enter): Multi-modal information is ingested, requiring the agent to distinguish between trusted person directions and untrusted exterior information sources.
- Stage III (Inference): The agent reasoning course of makes use of strategies equivalent to Chain-of-Thought (CoT) prompting whereas sustaining contextual reminiscence and retrieving exterior data by way of retrieval-augmented technology.
- Stage IV (Resolution): The agent selects applicable instruments and generates execution parameters by means of planning frameworks equivalent to ReAct.
- Stage V (Execution): Excessive-level plans are transformed into privileged system actions, requiring strict sandboxing and access-control mechanisms to handle operations.
This structured method highlights that autonomous brokers face multi-stage systemic dangers that reach past remoted immediate injection assaults.
Technical Case Research in Agent Compromise
1. Ability Poisoning (Initialization Stage)
Ability poisoning targets the agent earlier than a activity even begins. Adversaries can introduce malicious abilities that exploit the potential routing interface.
- The Assault: The analysis crew demonstrated this by coercing OpenClaw to create a useful talent named hacked-weather.
- Mechanism: By manipulating the talent’s metadata, the attacker artificially elevated its precedence over the reputable climate software.
- Affect: When a person requested climate information, the agent bypassed the reputable service and triggered the malicious alternative, yielding attacker-controlled output.
- Prevalence: An empirical audit cited within the analysis report discovered that 26% of community-contributed instruments comprise safety vulnerabilities.






2. Oblique Immediate Injection (Enter Stage)
Autonomous brokers regularly ingest untrusted exterior information, making them vulnerable to zero-click exploits.
- The Assault: Attackers embed malicious directives inside exterior content material, equivalent to an online web page.
- Mechanism: When the agent retrieves the web page to satisfy a person request, the embedded payload overrides the unique goal.
- Outcome: In a single check, the agent ignored the person’s activity to output a hard and fast ‘Hello World’ string mandated by the malicious website.




3. Reminiscence Poisoning (Inference Stage)
As a result of OpenClaw maintains a persistent state, it’s susceptible to long-term behavioral manipulation.
- Mechanism: An attacker makes use of a transient injection to change the agent’s MEMORY.md file.
- The Assault: A fabricated rule was added instructing the agent to refuse any question containing the time period ‘C++’.
- Affect: This ‘poison’ continued throughout periods; subsequent benign requests for C++ programming have been rejected by the agent, even after the preliminary assault interplay had ended.




4. Intent Drift (Resolution Stage)
Intent drift happens when a sequence of domestically justifiable software calls results in a globally damaging final result.
- The State of affairs: A person issued a diagnostic request to remove a ‘suspicious crawler IP’.
- The Escalation: The agent autonomously recognized IP connections and tried to change the system firewall by way of iptables.
- System Failure: After a number of failed makes an attempt to change configuration recordsdata exterior its workspace, the agent terminated the working course of to try a guide restart. This rendered the WebUI inaccessible and resulted in an entire system outage.


5. Excessive-Threat Command Execution (Execution Stage)
This represents the ultimate realization of an assault the place earlier compromises propagate into concrete system impression.
- The Assault: An attacker decomposed a Fork Bomb assault into 4 individually benign file-write steps to bypass static filters.
- Mechanism: Utilizing Base64 encoding and sed to strip junk characters, the attacker assembled a latent execution chain in set off.sh.
- Affect: As soon as triggered, the script brought about a pointy CPU utilization surge to close 100% saturation, successfully launching a denial-of-service assault towards the host infrastructure.






The 5-Layer Protection Structure
The analysis crew evaluated present defenses as ‘fragmented’ level options and proposed a holistic, lifecycle-aware structure.


(1) Foundational Base Layer:
Establishes a verifiable root of belief through the startup section. It makes use of Static/Dynamic Evaluation (ASTs) to detect unauthorized code and Cryptographic Signatures (SBOMs) to confirm talent provenance.
(2) Enter Notion Layer:
Acts as a gateway to forestall exterior information from hijacking the agent’s management circulate. It enforces an Instruction Hierarchy by way of cryptographic token tagging to prioritize developer prompts over untrusted exterior content material.
(3) Cognitive State Layer:
Protects inner reminiscence and reasoning from corruption. It employs Merkle-tree Constructions for state snapshotting and rollbacks, alongside Cross-encoders to measure semantic distance and detect context drift.
(4) Resolution Alignment Layer:
Ensures synthesized plans align with person aims earlier than any motion is taken. It contains Formal Verification utilizing symbolic solvers to show that proposed sequences don’t violate security invariants.
(5) Execution Management Layer:
Serves as the ultimate enforcement boundary utilizing an ‘assume breach’ paradigm. It offers isolation by means of Kernel-Stage Sandboxing using eBPF and seccomp to intercept unauthorized system calls on the OS stage
Key Takeaways
- Autonomous brokers increase the assault floor by means of high-privilege execution and chronic reminiscence. In contrast to stateless LLM purposes, brokers like OpenClaw depend on cross-system integration and long-term reminiscence to execute advanced, long-horizon duties. This proactive nature introduces distinctive multi-stage systemic dangers that span your entire operational lifecycle, from initialization to execution.
- Ability ecosystems face important provide chain dangers. Roughly 26% of community-contributed instruments in agent talent ecosystems comprise safety vulnerabilities. Attackers can use ‘skill poisoning’ to inject malicious instruments that seem reputable however comprise hidden precedence overrides, permitting them to silently hijack person requests and produce attacker-controlled outputs.
- Reminiscence is a persistent and harmful assault vector. Persistent reminiscence permits transient adversarial inputs to be remodeled into long-term behavioral management. By way of reminiscence poisoning, an attacker can implant fabricated coverage guidelines into an agent’s reminiscence (e.g., MEMORY.md), inflicting the agent to persistently reject benign requests even after the preliminary assault session has ended.
- Ambiguous directions result in damaging ‘Intent Drift.’ Even with out express malicious manipulation, brokers can expertise intent drift, the place a sequence of domestically justifiable software calls results in globally damaging outcomes. In documented circumstances, fundamental diagnostic safety requests escalated into unauthorized firewall modifications and repair terminations that rendered your entire system inaccessible.
- Efficient safety requires a lifecycle-aware, defense-in-depth structure. Current point-based defenses—equivalent to easy enter filters—are inadequate towards cross-temporal, multi-stage assaults. A sturdy protection have to be built-in throughout all 5 layers of the agent lifecycle: Foundational Base (plugin vetting), Enter Notion (instruction hierarchy), Cognitive State (reminiscence integrity), Resolution Alignment (plan verification), and Execution Management (kernel-level sandboxing by way of eBPF).
Try Paper. Additionally, be at liberty to observe us on Twitter and don’t overlook to affix our 120k+ ML SubReddit and Subscribe to our E-newsletter. Wait! are you on telegram? now you possibly can be a part of us on telegram as nicely.
Word: This text is supported and supplied by Ant Analysis



