{"data":{"id":"a0f1c5b9-a61c-49b8-b025-42b4f75367ce","title":"Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems","summary":"Cline CLI version 2.3.0 was compromised in a supply chain attack (an attack on software before it reaches users) where an unauthorized party used a stolen npm publish token to add a postinstall script that automatically installed OpenClaw, an AI agent tool, on developer machines. The attack affected about 4,000 downloads over an eight-hour window on February 17, 2026, though the impact was considered low since OpenClaw itself is not malicious.","solution":"Cline maintainers released version 2.4.0 to fix the issue. Version 2.3.0 has been deprecated, the compromised token has been revoked, and the npm publishing mechanism was updated to support OpenID Connect (OIDC, a secure authentication standard) via GitHub Actions. Users are advised to update to the latest version, check their systems for unexpected OpenClaw installations, and remove it if not needed.","labels":["security"],"sourceUrl":"https://thehackernews.com/2026/02/cline-cli-230-supply-chain-attack.html","publishedAt":"2026-02-20T14:20:00.000Z","cveId":null,"cweIds":null,"cvssScore":null,"cvssSeverity":null,"severity":"high","attackType":["supply_chain","prompt_injection"],"issueType":"news","affectedPackages":null,"affectedVendors":["OpenAI"],"affectedVendorsRaw":["Cline CLI","OpenClaw","Claude","OpenAI"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":null,"epssScore":null,"patchAvailable":null,"disclosureDate":null,"capecIds":null,"crossRefCount":0,"attackSophistication":"advanced","impactType":["integrity","confidentiality"],"aiComponentTargeted":"agent","llmSpecific":true,"classifierConfidence":0.92,"researchCategory":null,"atlasIds":null}}