Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Openclaw, Rogue Agents, and Application Hygiene
Published:
April 1, 2026

Openclaw, Rogue Agents, and Application Hygiene

By:
Casey Smith
Share icon
Glitch effectGlitch effectGlitch effect


Acknowledgements: Special thanks to the Huntress Adversary Tactics and Product teams for their work building out identity telemetry, Rogue Applications, and SIEM detections that made this research possible. Special thanks to Dave Kleinatland and Matt Kiely for their help in tooling and research on Azure applications.



Background

Since its introduction, OpenClaw has seen rapid adoption across a wide range of organizations experimenting with AI agents and automation in production environments. In a previous post, we focused on a fake OpenClaw that served as a malware and infostealer delivery vector and walked through how the project has evolved from Moltbot and ClawdBot into its current form.

This time, we’re looking at a different but related problem: how OpenClaw shows up as a cloud application inside Microsoft tenants, which permissions it receives, and how those permissions translate directly into identity and data exposure. Rather than focusing on code-level analysis, we’re going to treat OpenClaw like what it has effectively become in many environments: a powerful, semi‑trusted service principal sitting in the middle of your identity attack surface.


What is OpenClaw in a cloud context?

OpenClaw is a widely adopted, open-source AI agent that can be wired into mail, calendar, file storage, and other business systems to automate routine work. Depending on how it’s deployed, it may not look like “malware” at all. In a number of tenants we examined, OpenClaw (and older names like “Moltbot”) was installed by individual users as a “productivity helper” and granted access to their mailbox or calendar so it could draft emails, summarize threads, or schedule meetings. From an identity perspective, that’s exactly what makes OpenClaw so dangerous. It can be provisioned with:

  • Application permissions – direct, tenant‑wide access granted to the app, operating without a signed‑in user. This is the highest‑risk mode; think “read or modify every mailbox in the tenant.” These require admin consent.

  • Delegated permissions – access granted on behalf of a specific user and constrained (in theory) by that user’s own permissions and scope. By default, users can grant these without any admin approval or visibility, creating a significant oversight gap. Disabling User Consent to applications is a key mitigation.

In practice, we’ve seen both, and the line between “helpful assistant” and “unbounded identity proxy” can disappear quickly once broad application permissions are in play.



What makes these apps so risky?

When you peel back the friendly branding and look solely at what the app can do, some OpenClaw‑related service principals show up with permission sets that are indistinguishable from high‑value admin tooling. For example, we observed apps with:

  • UserAuthMethod‑Email.ReadWrite.All – the ability to modify user authentication methods via email, creating a direct path to account takeover if abused.

  • Directory.ReadWrite.All – full read/write access to the Entra ID directory, including users, groups, and roles.

  • Application.ReadWrite.All – the power to register, modify, or delete any application in the tenant.

  • DelegatedPermissionGrant.ReadWrite.All and AppRoleAssignment.ReadWrite.All – the ability to grant OAuth permissions and assign app roles on behalf of others, effectively enabling consent bypass and privilege escalation.

  • Sites.FullControl.All – full control over all SharePoint sites, including permission management and content access.

At that point, the label on the app—OpenClaw, Moltbot, “Assistant,” or anything else—is far less important than the reality: you’ve handed a third‑party agent carte blanche to act across your tenant. If a threat actor compromises that agent, steals its secrets, or tampers with its backend infrastructure, they inherit those privileges immediately.


Huntress observations across customer tenants

To understand how widespread this pattern is, we scanned customer environments for cloud applications with names associated with OpenClaw and its earlier branding, including “OpenClaw,” “Moltbot,” and similar variants. Initial scans identified on the order of dozens of apps in late February, and subsequent scans in March showed that number continuing to grow as more organizations experimented with AI agents and automation.

Most of what we found fell into two broad buckets:

  1. User‑installed assistants – where a single user had granted the app access to their own mailbox or calendar. These still matter, particularly when the user is highly privileged (IT, finance, executive staff), but they’re at least scoped to a single identity.

  2. “Too‑powerful” service principals – where an OpenClaw‑branded app had been registered centrally and given sweeping directory, mail, and SharePoint permissions well beyond what was necessary for the documented use case.

Across both categories, the common thread was a lack of sustained application hygiene. Teams knew “we’re trying AI assistants,” but there was no durable process for reviewing what those assistants could actually do, how that scope changed over time, or which approvals had been granted in the first place.


Yet another identity weak spot

Installed agents and cloud applications—whether for remote monitoring, AI assistance, or simple productivity—have become a new weak spot in many environments. The risk shows up in two places:

  • The install itself. If you don’t tightly control and audit who can consent to apps, a single user can introduce a powerful new identity path into your tenant with a single click.

  • The access that remains. Once the app is live, it becomes a persistent entry point. If an attacker compromises the vendor, steals app secrets, or abuses a configuration bug, they step directly into the privileges you’ve already granted that agent—often bypassing your traditional endpoint‑centric defenses in the process.

As with any powerful RMM agent, once these apps are in place, they’re a prime target. The difference is that they often sit squarely inside your identity and SaaS control plane, not just on endpoints, and traditional AV or EDR may never see them.


Hunting for OpenClaw and similar apps with Huntress

Huntress customers have two major advantages when it comes to finding and understanding OpenClaw‑style agents in their environment:

  1. Rogue Applications – Cloud Application Inventory

  2. Huntress Managed SIEM – Identity and Application Activity Search

Step 1: Inventory what’s installed

Start in Identity Threat Detection & Response → Rogue Applications → Cloud Applications to get a consolidated view of service principals and cloud apps in your tenant, including OpenClaw and Moltbot derivatives. Use keyword searches for strings like:

  • OpenClaw

  • Moltbot

  • Legacy or internal project names that wrapped the same agent functionality

For each hit, review:

  • Who installed or consented to the app

  • When it was added to the tenant

  • Which permission level Huntress has classified it as (for example, “Powerful” for high‑impact permission sets)

This gives you the baseline inventory you need so that anything new or unexpected stands out immediately.

Figure 1: Huntress Rouge Applications showing application name, permissions, and who authorized the application 

Step 2: Understand what it can do

Next, focus on permissions, not just presence. Pay particular attention to:

  • Directory‑wide permissions (any *.ReadWrite.All on directory, applications, or app roles)

  • Mailbox and SharePoint permissions that operate across all objects

  • Any scopes that allow the app to grant, modify, or propagate its own permissions

The access granted to each app should be the absolute minimum required for its documented job, and you should be wary of “permission drift” as features are added or configuration is changed over time. You can also review your tenant for applications that Huntress has marked as Powerful, so you can search or sort by what permissions the application has consented to, in addition, and work from there.

Step 3: Follow the trail in SIEM

Once you’ve identified OpenClaw‑related apps, pivot into Huntress Managed SIEM to understand what they’ve actually done. One place to start is searching Identity and Entra audit logs for application consent and update events tied to OpenClaw or Moltbot names.

For example, if your internal naming still uses a legacy moniker like moltbot, you can begin with an ESQL query of the form:

from logs

| WHERE itdr.Target LIKE "%moltbot%"

or

from logs

| WHERE itdr.Target LIKE "%openclaw%"

Figure 2: Huntress Managed SIEM showing events associated with an OpenClaw installation

From there, pivot into:

  • Consent events – when was the app first granted access, and by whom?

  • Update operations – have its permissions changed, and did that coincide with other suspicious activity?

  • Downstream actions – which mailboxes, files, or identities did the app interact with after consent? What did it read, write, or modify?

This is the difference between “we know OpenClaw exists here” and “we can tell you exactly what it did, when, and to whom.”

For additional ideas and queries you can find more examples here.


Mitigation and hardening guidance

OpenClaw and similar AI agents aren’t inherently evil, and some organizations will decide that the productivity benefits are worth the risk. But that decision needs to be explicit, guided by policy, and backed by continuous monitoring.

Some practical steps you can take today:

  • Set clear policies for who can consent to third‑party cloud apps and under what circumstances. Treat powerful AI agents as part of your identity attack surface, not as harmless productivity add‑ons.

  • Search your Entra environment (and Huntress Rogue Applications) for OpenClaw, Moltbot, and related names. Confirm that you recognize each deployment and understand its purpose.

  • Validate permissions and scope. Where possible, move apps from application permissions to delegated scopes, and aggressively trim any “*.ReadWrite.All” exposure that isn’t strictly necessary.

  • Review activity via SIEM. Use Huntress Managed SIEM to identify what these apps have actually done: which identities they’ve acted on, what content they’ve accessed, and whether that behavior lines up with expectations.

  • Remove or disable unnecessary apps. If an OpenClaw deployment is no longer needed—or was never approved in the first place—revoke its consent, disable the service principal, and document that decision before it becomes an incident write‑up instead of a hygiene task.


Key takeaways

  • Blurring boundaries: OpenClaw serves as a case study for how rapidly AI agents can transition from helpful "tooling" to a dangerous "threat surface."
  • Permission-based risk: The primary risk isn't from new exploits or zero-days, but from high-impact, well-documented permissions quietly granted to AI assistants within the identity plane.
  • Proactive management: You can transform "ghost vulnerabilities" into manageable risks by:
    • Maintaining a continuous inventory of applications and agents in your tenant.
    • Gaining a clear understanding of their specific capabilities.
    • Monitoring how their access and permissions evolve over time.
  • Preemptive defense: Proper visibility ensures that if an attacker attempts to hijack a powerful agent, you already know its location, its reach, and the steps required to shut it down.

We hope you come away with the tools to both know where OpenClaw or some derivative agent has been deployed, and if so, what did it do? The last thing you want to find out too late.






Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Don't let "later" cost you

Join us on May 20 (12pm EST) for _declassified, for an unfiltered look from Truman Kain at the overlooked security obligations that hit hard later.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Out of Sight, Top of Mind: Showing the Hidden Value of Cybersecurity

    It can be difficult to demonstrate the value of cybersecurity when your stack is doing its job. Here is how you can show the hidden value of cybersecurity.
  • From W-2 to BYOVD: How a Tax Search Leads to Kernel-Mode AV/EDR Kill

    Huntress uncovers a tax-themed malvertising campaign using Google Ads, dual cloaking, rogue ScreenConnect, and an undocumented Huawei driver to kill AV/EDR.
  • Hot Takes and Cyber Predictions for 2022

    What cybersecurity trends will we see in this new year? In this blog, we share some hot takes and predictions for 2022.
  • 7 Takeaways from the Executive Order on Improving Cybersecurity

    President Biden signed a 34-page Executive Order aimed at strengthening the nation’s cybersecurity standards. Here are the top seven takeaways.
  • The Best Way to Prepare for the Worst: Incident Response Planning for Decision Makers

    Every business is unique, and your incident response plan should be too. Learn why having a tailored plan is crucial for staying prepared and minimizing risk.
  • Product Support the Huntress Way

    We explore the third arm of our ThreatOps team—Support—and dive into how the team operates.
  • From Mandates to Assurance: How Managed SIEM Helps Decode Compliance Across the Globe

    Understand how Managed SIEM supports your compliance journey worldwide.
  • Threat Advisory: Possible AnyDesk Stolen Code Signing Certificate

    Huntress is tracking concerns regarding the AnyDesk remote control software and provider.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy