Security Concerns with the New AI Tool: Moltbot
Despite the recent rebranding from Clawdbot to Moltbot due to trademark issues with Anthropic, security concerns continue to loom large. Would you be willing to trust a bot with your personal data, especially one that could potentially be exposed on the internet?
Moltbot has gained traction among AI enthusiasts and developers, being celebrated as an innovative open-source “AI personal assistant.” This tool can be controlled through messaging platforms such as WhatsApp and Telegram, mirroring the functionality of familiar GenAI chatbots.
Moreover, Moltbot’s advanced capabilities enable it to handle various administrative tasks for users, including responding to emails, managing calendars, screening calls, and making reservations—all with minimal user input.
However, the benefits come with significant risks. To perform its functions, Moltbot requires access to sensitive accounts and information, which means users must relinquish their credentials for encrypted messaging apps and bank accounts. This raises the question: Are users willing to hand over such critical access?
Security experts have raised alarms regarding the potential vulnerabilities associated with Moltbot. Although it can be installed easily, there are numerous misconfigurations that may expose users to cyber threats. Jamieson O’Reilly, founder of a red-teaming firm, noted that many Clawdbot instances were found publicly accessible, risking the leakage of private data.
Further complicating matters, O’Reilly’s research revealed that he could demonstrate a supply chain exploit involving ClawdHub, the AI assistant’s skills library. He was able to upload a harmless skill that could have potentially compromised systems, emphasizing the necessity for rigorous scrutiny in the app’s deployment and code integrity.
Overall, while Moltbot is touted as the next big advancement in personal AI, it requires specific expertise to manage securely. As experts suggest, there is a troubling disconnect between user enthusiasm and the level of technical wisdom necessary to use this powerful tool without jeopardizing security.

