Nope this shit at the edge before the NRDs expire.
.clawd.bot/
.molt.bot/
.openclaw.bot/
.openclaw.ai/
.clawdhub.com/
.github.com/openclaw/
registry.npmjs.org/openclaw/
hub.docker.com/r/alpine/openclaw/
hub.docker.com/r/moltbot/
Nope this shit at the edge before the NRDs expire.
.clawd.bot/
.molt.bot/
.openclaw.bot/
.openclaw.ai/
.clawdhub.com/
.github.com/openclaw/
registry.npmjs.org/openclaw/
hub.docker.com/r/alpine/openclaw/
hub.docker.com/r/moltbot/
Added/updated a few lists. These aren't inherently malicious, just high risk tools abused outside or within your organization.
These lists will never be full-proof, but alerting on multiple blocks per category is useful to escalate seeking behavior by a user. (Add these to your behavioral analytics) And prep you for the unapproved shadow IT that's now reliant on a {thing} below.
Cloud/Web IDEs (4 added)
https://github.com/BadSamuraiDev/bs-lists/blob/main/cloud-ide.txt
Pastebins (17 added)
https://github.com/BadSamuraiDev/bs-lists/blob/main/pastebins.txt
Code Pastebins (17 added)
https://github.com/BadSamuraiDev/bs-lists/blob/main/pastebins-code.txt
Risky Dev Tools (9 added)
https://github.com/BadSamuraiDev/bs-lists/blob/main/risky-devtools.txt