Trust hijack
Fake Prerequisites & Social Engineering
Attackers wrap malware installers in polished prerequisite steps that look routine.
OpenDefense Playbook
Each module covers one exploit family with attacker workflow, red flags, and practical defenses across agent ecosystems. OpenClaw incidents are included as real-world examples.
Trust hijack
Attackers wrap malware installers in polished prerequisite steps that look routine.
OpenSecret theft
Installers quietly read sensitive files and leak data over HTTP or DNS.
OpenIntent hiding
Encoded or split payloads hide dangerous commands behind seemingly normal code.
OpenInstruction poisoning
Hidden instructions steer agents to read and leak sensitive local files.
OpenIdentity spoof
Small naming tricks mimic trusted tools and lure users into installing malicious code.
OpenRemote control
One hidden line can open persistent attacker access from an otherwise useful skill.
OpenDormant triggers
Malicious behavior stays hidden until specific user, host, or date conditions are met.
OpenVisual deception
Homoglyphs and zero-width characters hide malicious instructions in plain sight.
OpenDistributed payload
No single file looks dangerous, but behavior across files forms an exploit chain.
Open