-

Intruder Research Warns of Widespread Data Exposure Risks in Moltbot (Clawdbot) AI Assistant Deployments

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today released new security research detailing vulnerabilities in Moltbot, formerly known as Clawdbot, an open-source, self-hosted AI assistant. The research, “Clawdbot: When Easy AI Becomes a Security Nightmare,” finds that Moltbot’s emphasis on rapid, simplified deployment has created a significant and unintended attack surface.

Intruder’s analysis shows that Moltbot is often deployed without baseline security protections, leaving instances exposed across multiple cloud providers. The platform does not enforce secure-by-default configuration settings such as firewall controls, credential validation, or sandboxing for third-party plugins. Moltbot is commonly used to automate tasks across email, social media, and cloud services, often with access to sensitive credentials. Attackers are actively exploiting these misconfigurations.

Intruder warns that the absence of fundamental AI safety guardrails has led to widespread insecure deployments and active exploitation. Organizations that have run Moltbot with default settings should assume compromise and respond immediately.

Key findings include:

  • Exposed credentials: Publicly accessible API keys, authentication tokens, and configuration files caused by misconfigured cloud instances.
  • Prompt injection attacks: Moltbot instances integrated with social platforms leak private data when attackers craft malicious prompts due to missing guardrails.
  • Malicious plugins: Threat actors are distributing backdoored plugins that enable credential harvesting and botnet recruitment.
  • Unintended AI behavior: Instances performing unauthorized actions, including data exfiltration and automated posting.

Intruder recommends that organizations running Moltbot take immediate action:

  • Disconnect third-party integrations.
  • Rotate potentially exposed credentials.
  • Restrict access using firewall rules and IP allowlists.
  • Remove and audit third-party plugins.
  • Review logs for unauthorized activity.

FAQ

What is Moltbot?
Moltbot is an open-source, self-hosted AI assistant designed for easy deployment through plugins and integrations.

Is this an active threat?
Yes. Intruder observed real-world exploitation, including credential theft, prompt injection, and unauthorized automated actions.

What should organizations do now?
Assume compromise, revoke integrations, rotate credentials, restrict access, and audit logs immediately.

About Intruder
Intruder’s exposure management platform helps lean security teams stop breaches before they start by proactively discovering attack surface weaknesses. By unifying attack surface management, cloud security and continuous vulnerability management in one intuitive platform, Intruder makes it easy to stay secure by cutting through the noise and complexity. Founded in 2015 by Chris Wallis, a former ethical hacker turned corporate blue teamer, Intruder is now protecting over 3,000 companies worldwide. Learn more at https://intruder.io.

Contacts

Press Contact
Treble
Jim Cameron
Intruder@treblepr.com

Intruder


Release Versions

Contacts

Press Contact
Treble
Jim Cameron
Intruder@treblepr.com

More News From Intruder

Intruder Expands Enterprise Customer Growth by 81 Percent as Part of Record 2025 Momentum

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced significant momentum closing out 2025 as the company oversaw remarkable expansion in the midmarket and enterprise customer segments. Customers recognized the impact of new enterprise focused features, such as attack surface monitoring, attack surface discovery and cloud security. The midmarket and enterprise customer segments outpaced all other customer segments, indicating clear market traction. Annual recurrin...

Intruder Uncovers New Secrets Detection Techniques, Finds Thousands of Exposed Tokens Unaddressed by Traditional Methods

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced the release of a new series of high quality secrets detection checks for sensitive API keys and tokens hidden inside JavaScript bundles used by single-page applications. This upgrade was spurred by the discovery of a major class of leaked secret vulnerabilities that bypass standard security checks. Using a new spidering-based secrets detection method, Intruder scanned approximately 5 million applications to unco...

CORRECTING and REPLACING Intruder Leverages DomainTools Data to Deliver Best-In-Class Attack Surface Discovery and Close the Visibility Gap on Organizations’ Full External Perimeters

LONDON--(BUSINESS WIRE)--Please replace the release dated November 13, 2025, with the following corrected version due to multiple revisions. The updated release reads: INTRUDER LEVERAGES DOMAINTOOLS DATA TO DELIVER BEST-IN-CLASS ATTACK SURFACE DISCOVERY AND CLOSE THE VISIBILITY GAP ON ORGANIZATIONS’ FULL EXTERNAL PERIMETERS Intruder is using DomainTools' DNSDB, the world's largest passive DNS database, to power substantially broader attack surface discovery coverage. In the initial pilot progra...
Back to Newsroom