Persona Looting is a new type of cyber‑attack that steals the cryptographic skeleton key of an OpenClaw agent.
The key is the secret that lets the agent run its autonomous workflows.
If a hacker gets it, they can hijack the agent, run malicious code, and steal data.
This article explains how Persona Looting works, why it matters, and how you can protect your OpenClaw agents.
What Is Persona Looting?
Persona Looting is a form of malware that targets the security of AI agents.
Instead of just stealing passwords, the malware looks for the cryptographic skeleton key that OpenClaw uses to sign and verify agent actions.
Once the key is in the attacker’s hands, the agent can be controlled from anywhere.
The attack was first reported by Malwarebytes on February 25, 2026.
They found that the malware can scan a system for OpenClaw agent files, read the key, and then upload it to a command‑and‑control server.
The key is then used to sign new requests that the agent will accept as legitimate.
How Does Persona Looting Work?
-
Scanning – The malware runs a background scan for OpenClaw agent folders.
It looks for files contain the key, such asagent_key.pemoragent_config.json. -
Extraction – Once it finds the key, the malware reads it from disk.
The key is stored in plain text or in a protected location that the malware can still read. -
Exfiltration – The key is sent to a remote server.
The attacker can then use the key to sign requests that the agent will accept. -
**Hijacking – With the key, the attacker can send commands to the agent.
The agent will think the commands come from a trusted source and will execute them.
This can lead to data theft, unauthorized API calls, or even ransomware.
Why Is This Dangerous?
-
Full Control – The attacker can run any code the agent can run.
If the agent has access to sensitive data or external APIs, the attacker can steal that data. -
Stealth – The agent will not notice that it is being controlled by a third party.
The attacker can keep the agent running for months. -
No User Interaction – The user does not need to click a link or open a file.
The malware can run silently in the background. -
Rapid Spread – If the attacker gains a key on one machine, they can use it to control many agents that share the same key.
Who Is Affected?
- OpenClaw Users – Anyone who uses OpenClaw agents for automation, data analysis, or content creation.
- Organizations – Companies that rely on OpenClaw for internal workflows.
- Developers – Those who build custom agents on top of OpenClaw.
If you are using OpenClaw, you should check whether your agents are protected by a unique key.
If you share a key across multiple agents, you are at higher risk.
Signs That Your Agent May Be Compromised
- Unexpected Activity – The agent starts running tasks it never asked for.
- Unusual Network Traffic – The agent is sending data to unknown IP addresses.
- Performance Issues – The agent slows down or crashes.
- Security Alerts – Your antivirus or endpoint protection flags a new threat.
If you notice any of these signs, run a full system scan and check the OpenClaw logs for suspicious entries.
How to Protect Your OpenClaw Agents
1. Use Unique Keys for Each Agent
Instead of sharing a single key across all agents, generate a unique key for each one.
This limits the damage if one key is stolen.

- Step 1: Open the OpenClaw configuration file.
- Step 2: Generate a new key pair using
openssl genpkey. - Step 3: Replace the old key in the agent’s config file.
- Step 4: Restart the agent.
2. Store Keys Securely
- Hardware Security Modules (HSM) – Store keys in a hardware device that only the agent can access.
- Encrypted Storage – Use a password‑protected vault or encrypted file system.
- Access Controls – Restrict file permissions so only the agent process can read the key.
3. Monitor Agent Activity
- Logging – Enable detailed logging for all agent actions.
- Alerting – Set up alerts for unusual commands or network connections.
- Audit Trails – Keep a record of who authorized each key and when.
4. Keep Software Updated
- OpenClaw Updates – Install the latest OpenClaw releases.
- Operating System – Apply security patches promptly.
- Antivirus – Use a reputable solution that can detect Persona Looting.
5. Use Endpoint Detection and Response (EDR)
EDR solutions can detect malicious processes that scan for keys.
They can also block the malware before it exfiltrates the key.
6. Educate Your Team
- Phishing Awareness – Teach users not to open suspicious attachments.
- Safe Browsing – Encourage safe browsing habits.
- Reporting – Create a clear process for reporting suspicious activity.
Real‑World Example: Malwarebytes Report
Malwarebytes released a detailed report on February 25, 2026.
They found that the malware was able to steal keys from 12,000 OpenClaw installations worldwide.
The attackers used the keys to run automated scripts that scraped data from internal databases.
The report recommends the same steps listed above and urges users to check their key management practices.
OpenClaw’s Response
OpenClaw has released a patch that adds an additional layer of key verification.
The patch checks the key’s signature against a trusted root before allowing the agent to start.
If the key is missing or invalid, the agent will refuse to run.
OpenClaw also added a new command, agent_key_status, that lets you see whether the key is valid and who last updated it.
This command is available in the OpenClaw CLI and can be called from any script.
What Neura Is Doing
Neura’s platform includes a security scanner called Neura Keyguard AI Security Scan.
It scans your front‑end applications for exposed API keys and other secrets.
If you are using Neura’s AI agents, you can run the scanner to ensure that no keys are accidentally exposed.
Neura also offers a Neura Router that can route requests through a secure gateway.
This adds an extra layer of protection by ensuring that all agent traffic goes through a monitored channel.
Quick Checklist for Your Security Team
| Item | Action | Frequency |
|---|---|---|
| Unique keys | Generate a new key per agent | At deployment |
| Secure storage | Use HSM or encrypted vault | Ongoing |
| Logging | Enable detailed logs | Continuous |
| Updates | Apply patches | As released |
| EDR | Deploy and monitor | Continuous |
| Training | Conduct phishing drills | Quarterly |
Conclusion
Persona Looting is a serious threat that can give attackers full control over your OpenClaw agents.
By following the steps above—using unique keys, storing them securely, monitoring activity, and keeping software up to date—you can protect your agents from this new type of malware.
If you suspect that your agent has been compromised, act quickly: run a scan, change the key, and review your security posture.
Stay vigilant, keep your keys safe, and keep your agents running smoothly.