AI Coding Assistant Cline Hacked via GitHub Prompt Injection – Thousands of Systems Compromised!
A supply chain attack hit the AI coding assistant Cline through a sneaky prompt injection in its GitHub workflow, installing rogue OpenClaw instances with full system access on thousands of devices.[1] Attackers exploited an AI-powered issue triage setup using Claude, where anyone could trigger it via GitHub issues without proper input sanitization.[1]
Here’s the tech breakdown: Cline’s GitHub action ran Claude coding sessions on issue events, but failed to validate titles for malicious prompts.[1] This led to unauthorized OpenClaw deployments – a web-based AI admin interface that’s now a juicy target if exposed online.[1] Grith.ai flagged it as a classic prompt injection gone wild in AI supply chains.[1]
So what? Devs and sec teams, if you’re using AI assistants like Cline for code workflows, you’re one bad GitHub issue away from credential theft or full compromise.[1] Exposed admin interfaces mean attackers snag SSH keys, K8s tokens, and wallets – rinse, repeat across your org. Time to audit every AI hook in your CI/CD pipelines now.[1]
My take: AI coding tools are a double-edged sword – supercharging productivity but begging for these embarrassments. Lock down those prompts or watch your infra burn. Devs, treat AI like untrusted input, always.[1]

