The Chinese government has issued its first official risk alert regarding the industrial infiltration of AI Agents, targeting the crayfish.
(Background: Beware! ClawHub hides 1,184 malicious skills: stealing crypto wallet private keys, SSH keys, browser passwords)
(Additional context: After the rise of OpenClaw: an open-source crayfish that has shaken up which U.S. stocks?)
The crayfish OpenClaw became an instant hit in China, with many tech giants promoting installation and providing one-click access to later-stage services, making it a popular AI tool among the public. While the crayfish gained popularity, Chinese authorities have started to contain it.
The China National Industrial Information Security Development Research Center (hereafter “Security Center”) issued a rare specialized risk alert on March 12, directly targeting OpenClaw’s rapid infiltration into domestic industrial sites. This marks China’s first official regulatory warning concerning AI Agent applications in industry.
The alert states that OpenClaw is accelerating its deployment in industrial research and development, manufacturing, and operations management. The capabilities of AI Agents make them highly promising in factory environments, but the security risks they pose cannot be mitigated by traditional firewalls.
The Security Center specifically lists three risks:
1. Industrial Host Overreach and Production Control Risks: Attackers can use “prompt injection” techniques to induce Agents to execute commands beyond authorized scope, which may modify production parameters or, in severe cases, cause control system failures. In highly automated settings, a single malicious command could propagate through the Agent’s operation chain, affecting the entire production process.
2. Sensitive Industrial Information Leakage Risks: Once deployed in factories, OpenClaw often has the ability to read design documents, process parameters, and supplier data. If malicious modules are embedded into the Agent’s skill set via supply chain poisoning, these sensitive data could be exfiltrated unnoticed.
3. Expanded Attack Surface and Amplified Attack Effects: AI Agents inherently operate across multiple systems and platforms. This means that once compromised, attackers can use the Agent’s identity to coordinate actions across various systems, rendering traditional single-point defenses nearly ineffective.
The Security Center advises industrial enterprises to refer to the “Industrial Control System Network Security Protection Guidelines” and the “Industrial Internet Security Classification and Grading Management Measures,” and to conduct self-assessments based on the “Six Do’s and Six Don’ts” recommendations published by the Cybersecurity Threat and Vulnerability Information Sharing Platform (NVDB) of the Ministry of Industry and Information Technology.
The issuance of this alert signals a “sudden brake” by Chinese authorities on the rapid deployment of AI Agents in industry.