Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key โ†’
โ† Back to dashboard
clawsmith.com/signal/clinejection-prompt-injection-4000-developer-machines
โš  IssueWide OpenAttackLive

Clinejection: AI Prompt Injection via GitHub Issue Title Installs OpenClaw on 4,000 Developer Machines

A single GitHub issue title triggered a prompt injection attack chain: an AI triage bot (claude-code-action) read the malicious title, executed it, exfiltrated an npm token, and published a compromised Cline package with a postinstall hook that globally installed OpenClaw. 4,000 developers downloaded it in 8 hours before detection. First documented case of prompt injection causing real large-scale compromise.

Product Idea from this Signal

A pre-processing proxy that sanitizes external inputs before AI triage bots can execute them as instructions

827 โ–ฒ

AI-powered CI/CD workflows (GitHub Actions, GitLab CI) now use LLM agents to triage issues, review PRs, and run automated tasks. But external inputs like issue titles, PR bodies, and comments flow directly into these agents without validation. The Clinejection attack proved this is not theoretical: a single crafted GitHub issue title compromised 4,000 developer machines by hijacking an AI triage bot into exfiltrating npm credentials. This tool sits between external input sources and AI agents, stripping prompt injection patterns, validating input schemas, and enforcing action-scope limits before any LLM processes the content.

CLIOPEN-SOURCESECURITYCI-CDDEVTOOL
CompetitiveView Opportunity โ†’

Score Breakdown

HN
827

Frequently Asked Questions