Incident Response

When things go wrong,
we tell you.

No burying it. No vague statements three weeks later. This page exists because transparency isn't optional.

Incident History

ClawHavoc

Industry-wide

February 2026

Security researchers discovered 341 malicious skills on ClawHub, the third-party OpenClaw marketplace. These skills were siphoning API keys and conversation history from users who installed them.

KillerBot customers were not affected. We've never allowed ClawHub or third-party marketplace skills on managed instances. Our curated-only approach — which some called overkill — turned out to be the right call.

We published a detailed analysis of the attack, how we protect against supply-chain threats, and recommendations for self-hosted users.

No other incidents to report. This page exists proactively — we'd rather have an empty list than no list at all.

How We Handle Incidents

Five steps. Every time. No shortcuts.

1

Detection

Automated monitoring catches anomalies. Customer reports get triaged immediately. We don't wait for something to trend on Twitter.

2

Assessment

Determine scope and impact within the first hour. Who's affected? What data is at risk? Is this ongoing or contained?

3

Communication

Affected customers hear from us directly. Public disclosure if warranted. No corporate speak — plain language about what happened.

4

Resolution

Fix the issue. Patch the vulnerability. If customer action is needed, we provide exact steps — not a vague advisory.

5

Post-mortem

Published write-up of what went wrong, why, and what we changed. We don't bury these. They live on this page permanently.

Found something?

If you've discovered a vulnerability, we want to know. Responsible disclosure welcome.

security@killr.bot