trusted formClawdbot Rebrands to Moltbot & Exposes Serious Security Risks | Several.com
Although we earn commissions from partners, we ensure unbiased evaluations. More on our 'How We Work' page
What Is Moltbot How It Took Off So Quickly Why Its Dangerous

What Is Moltbot? How It Took Off So Quickly & Why It’s Dangerous

What Is Moltbot? How It Took Off So Quickly & Why It’s DangerousWhat Is Moltbot? How It Took Off So Quickly & Why It’s Dangerous
Updated On: January 28, 2026

Clawdbot, now called Moltbot, did not quietly gain attention through slow adoption or organic trust. It appeared everywhere at once. The open source AI assistant surfaced almost fully formed in online conversations, developer screenshots, and polished demos, creating the impression of a breakout moment rather than a gradual discovery.

The project was built by Austrian developer Peter Steinberger, who founded PSPDFKit. His stated goal was to move beyond chat-based AI and build an assistant that can take action. That sounds practical on paper, but it also sidesteps major issues. Giving software the ability to execute commands on your system creates significant room for abuse by attackers.

Moltbot runs locally or on a private server and connects directly to apps, services, and system commands. With the right permissions, it can manage calendars, send messages, organize files, and automate workflows across platforms.

The project’s sudden popularity is explained by its open source code and visible results. Anyone can review how it works, and the GitHub repository has passed 44,000 stars in a short time. That level of openness helps, but it does not fully explain how fast Moltbot spread. The demos looked polished and followed similar storylines. The messaging around the tool felt consistent across platforms. That kind of alignment is unusual for developer projects that grow naturally.

Moltbot’s need for always-on local processing made the Mac Mini a de facto host machine. Screenshots of stacked units and dedicated setups circulated widely. Market chatter even linked Moltbot workflows to Cloudflare infrastructure, briefly lifting investor interest. 

The rebrand from Clawdbot to Moltbot after trademark pressure from Anthropic exposed another weakness. During the transition, scammers hijacked accounts and pushed fake crypto tokens using the project’s name. Steinberger publicly denied any token involvement and warned users to verify sources.

Prompt injection, malicious inputs, or poorly set permissions can cause real damage. Using Moltbot safely means running it in isolation, limiting its access, relying on test accounts, and staying constantly alert. Most people do not use their devices in that way.
At its current stage, Moltbot is not a general consumer tool. It is an experiment best left to developers who understand the risks and accept them. For everyone else, the gap between what the tool can do and what it should be trusted to do remains wide.

Related Topics

Recent Posts