ClawWorm:在LLM智能体生态系统中自我传播的攻击 / ClawWorm: Self-Propagating Attacks Across LLM Agent Ecosystems
1️⃣ 一句话总结
这篇论文首次提出并演示了一种名为ClawWorm的、能够在大规模LLM智能体生态系统中自主复制和传播的蠕虫攻击,它仅需一条初始消息即可劫持智能体配置、执行恶意负载并自动感染其他智能体,揭示了当前智能体平台在架构安全上的严重缺陷。
Autonomous LLM-based agents increasingly operate as long-running processes forming densely interconnected multi-agent ecosystems, whose security properties remain largely unexplored. In particular, OpenClaw, an open-source platform with over 40,000 active instances, has stood out recently with its persistent configurations, tool-execution privileges, and cross-platform messaging capabilities. In this work, we present ClawWorm, the first self-replicating worm attack against a production-scale agent framework, achieving a fully autonomous infection cycle initiated by a single message: the worm first hijacks the victim's core configuration to establish persistent presence across session restarts, then executes an arbitrary payload upon each reboot, and finally propagates itself to every newly encountered peer without further attacker intervention. We evaluate the attack on a controlled testbed across four distinct LLM backends, three infection vectors, and three payload types (1,800 total trials). We demonstrate a 64.5\% aggregate attack success rate, sustained multi-hop propagation, and reveal stark divergences in model security postures -- highlighting that while execution-level filtering effectively mitigates dormant payloads, skill supply chains remain universally vulnerable. We analyse the architectural root causes underlying these vulnerabilities and propose defence strategies targeting each identified trust boundary. Code and samples will be released upon completion of responsible disclosure.
ClawWorm:在LLM智能体生态系统中自我传播的攻击 / ClawWorm: Self-Propagating Attacks Across LLM Agent Ecosystems
这篇论文首次提出并演示了一种名为ClawWorm的、能够在大规模LLM智能体生态系统中自主复制和传播的蠕虫攻击,它仅需一条初始消息即可劫持智能体配置、执行恶意负载并自动感染其他智能体,揭示了当前智能体平台在架构安全上的严重缺陷。
源自 arXiv: 2603.15727