TL;DR
- Scammers focused OpenClaw contributors via faux GitHub problem threads, utilizing a $5,000 $CLAW airdrop to lure customers towards a wallet-draining website.
- The phishing web page mimicked the official area and used an obfuscated JavaScript file known as “eleven.js,” exhibiting the assault relied on social engineering, not a wise contract exploit.
- The report urged builders to confirm URLs, verify repository possession, ignore sudden tags, and use burner wallets for claims or unfamiliar dApps.
Scammers have discovered a sharply efficient strategy to hunt crypto holders inside a trusted developer workflow. The entice begins with credibility, not code exploits. Within the reported marketing campaign, contributors linked to the viral AI venture OpenClaw have been focused via faux GitHub accounts and problem threads that tagged actual builders instantly. The bait was a flattering promise of a $5,000 $CLAW token allocation, framed as a reward for GitHub contributions. Targets have been then pushed to a website mimicking the official OpenClaw area, the place a pockets connection immediate served because the gateway to a draining setup on-line.
Faux $5K airdrop targets OpenClaw devs
Scammers used faux GitHub tags to lure customers to a cloned website with a hidden pockets join.
Accounts vanished inside hours. No confirmed victims but.
Keep alert
pic.twitter.com/ZYpmckDJ1j
— Bitinning (@bitinning) March 19, 2026
Why the OpenClaw Hook Labored So Nicely
What makes the operation extra unsettling is how odd the setup seems at first look. A cloned website and hidden script do the heavy lifting. The report says the phishing web page directed customers to attach their wallets to say the supposed allocation, whereas a closely obfuscated JavaScript file known as “eleven.js” dealt with the malicious logic beneath. Researchers mentioned there was no good contract exploit concerned, solely social engineering wrapped in Web3 habits. That distinction issues, as a result of it reveals the assault relied much less on breaking software program and extra on manipulating person belief at exactly the appropriate second.

Timing seems central to why this lure might resonate so shortly. OpenClaw’s rising profile gave the rip-off instant plausibility. The venture had grow to be one of many hottest names in tech, shifting past a developer instrument right into a mainstream AI narrative. That visibility intensified additional after Sam Altman chosen creator Peter Steinberger to assist drive OpenAI’s work on AI brokers. In accordance with the report, attackers doubtless understood that OpenClaw contributors have been attentive, snug with Web3 wallets, and simpler to strategy with a reward-based message that felt tailor-made, well timed, and unusually credible to many potential targets on-line.
The report additionally outlined a sensible lesson that extends nicely past one venture. Operational safety, not curiosity, is now the primary line of protection. Builders have been urged to keep away from clicking hyperlinks in unfamiliar GitHub problem threads, manually sort official domains, confirm repository possession, and deal with sudden tags as spam by default. It really useful utilizing a burner pockets as an alternative of a main holding pockets for claims or dApp interactions. The broader warning is troublesome to disregard: as AI hype and crypto tooling converge, polished scams might hold exploiting authentic platforms to show consideration into pockets entry.

