{"id":923,"date":"2026-02-11T01:30:17","date_gmt":"2026-02-10T16:30:17","guid":{"rendered":"https:\/\/itexplore.org\/jp\/columns\/ai-research-trends-brain-alignment-life-inspired-intelligence-security-risks\/"},"modified":"2026-02-11T01:30:17","modified_gmt":"2026-02-10T16:30:17","slug":"ai-research-trends-brain-alignment-life-inspired-intelligence-security-risks","status":"publish","type":"post","link":"https:\/\/itexplore.org\/jp\/columns\/ai-research-trends-brain-alignment-life-inspired-intelligence-security-risks\/","title":{"rendered":"AI\u7814\u7a76\u306e\u6700\u65b0\u52d5\u5411\uff1a\u8133\u3068\u306e\u6574\u5408\u6027\u3001\u751f\u547d\u306b\u7740\u60f3\u3092\u5f97\u305f\u77e5\u80fd\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af"},"content":{"rendered":"<p>\u672c\u65e5\u306e\u6ce8\u76eeAI\u30fb\u30c6\u30c3\u30af\u30cb\u30e5\u30fc\u30b9\u3092\u3001\u5c02\u9580\u7684\u306a\u5206\u6790\u3068\u5171\u306b\u304a\u5c4a\u3051\u3057\u307e\u3059\u3002<\/p>\n<div class=\"wp-block-vk-blocks-alert vk_alert alert alert-warning has-alert-icon\">\n<div class=\"vk_alert_icon\">\n<div class=\"vk_alert_icon_icon\"><i class=\"fa-solid fa-triangle-exclamation\" aria-hidden=\"true\"><\/i><\/div>\n<div class=\"vk_alert_icon_text\"><span>Warning<\/span><\/div>\n<\/div>\n<div class=\"vk_alert_content\">\n<p>\u3053\u306e\u8a18\u4e8b\u306fAI\u306b\u3088\u3063\u3066\u81ea\u52d5\u751f\u6210\u30fb\u5206\u6790\u3055\u308c\u305f\u3082\u306e\u3067\u3059\u3002AI\u306e\u6027\u8cea\u4e0a\u3001\u4e8b\u5b9f\u8aa4\u8a8d\u304c\u542b\u307e\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u305f\u3081\u3001\u91cd\u8981\u306a\u5224\u65ad\u3092\u4e0b\u3059\u969b\u306f\u5fc5\u305a\u30ea\u30f3\u30af\u5148\u306e\u4e00\u6b21\u30bd\u30fc\u30b9\u3092\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002<\/p>\n<\/div>\n<\/div>\n<div class=\"wp-block-group\" style=\"margin-top:40px;margin-bottom:40px\">\n<h2 class=\"wp-block-heading\">\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u99c6\u52d5\u578b\u8868\u73fe\u5e7e\u4f55\u5b66\u30e2\u30b8\u30e5\u30fc\u30eb\u5316\u306f\u8a00\u8a9e\u30e2\u30c7\u30eb\u306b\u304a\u3051\u308b\u8133\u3068\u306e\u6574\u5408\u6027\u3092\u4e88\u6e2c\u3059\u308b<\/h2>\n<ul>\n<li><strong>\u539f\u984c:<\/strong> Training-Driven Representational Geometry Modularization Predicts Brain Alignment in Language Models<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">\u5c02\u9580\u30a2\u30ca\u30ea\u30b9\u30c8\u306e\u5206\u6790<\/h3>\n<div class=\"ai-summary-content\">\n<p>\u672c\u7814\u7a76\u3067\u306f\u3001\u5927\u898f\u6a21\u8a00\u8a9e\u30e2\u30c7\u30eb\uff08<strong>LLM<\/strong>\uff09\u304c\u4eba\u9593\u306e\u8a00\u8a9e\u306e\u795e\u7d4c\u8868\u73fe\u304a\u3088\u3073\u8a08\u7b97\u3068\u3069\u306e\u3088\u3046\u306b\u6574\u5408\u3059\u308b\u304b\u3092\u3001\u8868\u73fe\u5e7e\u4f55\u5b66\u3092\u30e1\u30ab\u30cb\u30ba\u30e0\u7684\u306a\u30ec\u30f3\u30ba\u3068\u3057\u3066\u7528\u3044\u3066\u8abf\u67fb\u3057\u307e\u3057\u305f\u3002<\/p>\n<p><strong>Pythia<\/strong>\uff0870M-1B\uff09\u306e\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u4e2d\u306b\u30a8\u30f3\u30c8\u30ed\u30d4\u30fc\u3001\u66f2\u7387\u3001\u304a\u3088\u3073<strong>fMRI<\/strong>\u30a8\u30f3\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u30b9\u30b3\u30a2\u3092\u8ffd\u8de1\u3057\u305f\u7d50\u679c\u3001\u5c64\u304c\u5b89\u5b9a\u3057\u305f\u4f4e\u8907\u96d1\u5ea6\u30af\u30e9\u30b9\u30bf\u30fc\u3068\u9ad8\u8907\u96d1\u5ea6\u30af\u30e9\u30b9\u30bf\u30fc\u306b\u81ea\u5df1\u7d44\u7e54\u5316\u3059\u308b\u5e7e\u4f55\u5b66\u7684\u30e2\u30b8\u30e5\u30fc\u30eb\u5316\u304c\u7279\u5b9a\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p>\u4f4e\u8907\u96d1\u5ea6\u30e2\u30b8\u30e5\u30fc\u30eb\u306f\u3001\u30a8\u30f3\u30c8\u30ed\u30d4\u30fc\u3068\u66f2\u7387\u306e\u4f4e\u4e0b\u3092\u7279\u5fb4\u3068\u3057\u3001\u4eba\u9593\u306e\u8a00\u8a9e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u6d3b\u52d5\u3092\u3088\u308a\u4e00\u8cab\u3057\u3066\u4e88\u6e2c\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u6574\u5408\u6027\u306f\u3001\u6642\u9593\u9818\u57df\uff08\u524d\u5074\u982d\u8449\u3001\u5f8c\u5074\u982d\u8449\uff09\u3067\u306f\u6025\u901f\u304b\u3064\u5b89\u5b9a\u3057\u3066\u3001\u524d\u982d\u9818\u57df\uff08<strong>IFG<\/strong>\u3001<strong>IFGorb<\/strong>\uff09\u3067\u306f\u9045\u5ef6\u7684\u304b\u3064\u52d5\u7684\u306b\u9032\u884c\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u7279\u306b\u3001\u30e2\u30c7\u30eb\u306e\u30b9\u30b1\u30fc\u30eb\u304c\u5927\u304d\u304f\u306a\u308b\u306b\u3064\u308c\u3066\u3001\u66f2\u7387\u306e\u4f4e\u4e0b\u306f\u3001\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u306e\u9032\u6357\u3092\u5236\u5fa1\u3057\u305f\u5f8c\u3067\u3082\u3001\u30e2\u30c7\u30eb\u3068\u8133\u306e\u6574\u5408\u6027\u3092\u4e88\u6e2c\u3059\u308b\u5f37\u529b\u306a\u6307\u6a19\u3067\u3042\u308a\u7d9a\u3051\u307e\u3057\u305f\u3002\u3053\u308c\u3089\u306e\u7d50\u679c\u306f\u3001\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u306b\u3088\u3063\u3066\u99c6\u52d5\u3055\u308c\u308b\u5e7e\u4f55\u5b66\u7684\u518d\u7de8\u6210\u304c\u3001\u6642\u9593\u7684-\u524d\u982d\u6a5f\u80fd\u7684\u5c02\u9580\u5316\u3068\u7d50\u3073\u3064\u3044\u3066\u3044\u308b\u3053\u3068\u3092\u793a\u5506\u3057\u3066\u304a\u308a\u3001\u8868\u73fe\u306e\u5e73\u6ed1\u5316\u304c\u795e\u7d4c\u306e\u3088\u3046\u306a\u8a00\u8a9e\u51e6\u7406\u3092\u4fc3\u9032\u3059\u308b\u53ef\u80fd\u6027\u3092\u793a\u5506\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\ud83d\udc49 <strong><a href=\"https:\/\/arxiv.org\/abs\/2602.07539\" target=\"_blank\" rel=\"noopener\">arXiv \u3067\u8a18\u4e8b\u5168\u6587\u3092\u8aad\u3080<\/a><\/strong><\/p>\n<\/div>\n<ul>\n<li><strong>\u8981\u70b9:<\/strong> Reduced curvature in LLM layers, driven by training, predicts better alignment with human brain activity, suggesting a pathway for more biologically plausible language processing.<\/li>\n<li><strong>\u8457\u8005:<\/strong> Yixuan Liu, Zhiyuan Ma, Likai Tang, Runmin Gan, Xinche Zhang, Jinhao Li, Chao Xie, Sen Song<\/li>\n<\/ul>\n<blockquote class=\"wp-block-quote\"><p><span>English Summary:<\/span><\/p>\n<p>This study investigated how Large Language Models (<strong>LLMs<\/strong>) align with the neural representation and computation of human language, using representational geometry as a mechanistic lens.<\/p>\n<p>By tracking entropy, curvature, and <strong>fMRI<\/strong> encoding scores throughout the training of <strong>Pythia<\/strong> (70M-1B), a geometric modularization was identified where layers self-organize into stable low- and high-complexity clusters.<\/p>\n<p>The low-complexity module, characterized by reduced entropy and curvature, consistently better predicted human language network activity. This alignment followed heterogeneous spatial-temporal trajectories: rapid and stable in temporal regions (AntTemp, PostTemp), but delayed and dynamic in frontal areas (<strong>IFG<\/strong>, <strong>IFGorb<\/strong>).<\/p>\n<p>Crucially, reduced curvature remained a robust predictor of model-brain alignment even after controlling for training progress, an effect that strengthened with model scale. These results link training-driven geometric reorganization to temporal-frontal functional specialization, suggesting that representational smoothing facilitates neural-like linguistic processing.<\/p>\n<\/blockquote>\n<\/div>\n<div class=\"wp-block-group\" style=\"margin-top:40px;margin-bottom:40px\">\n<h2 class=\"wp-block-heading\">\u751f\u547d\u306b\u7740\u60f3\u3092\u5f97\u305f\u6a5f\u68b0\u77e5\u80fd\u306e\u30d6\u30fc\u30c8\u30b9\u30c8\u30e9\u30c3\u30d7\uff1a\u5316\u5b66\u304b\u3089\u8a8d\u77e5\u3068\u5275\u9020\u6027\u3078\u306e\u751f\u7269\u5b66\u7684\u7d4c\u8def<\/h2>\n<ul>\n<li><strong>\u539f\u984c:<\/strong> Bootstrapping Life-Inspired Machine Intelligence: The Biological Route from Chemistry to Cognition and Creativity<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">\u5c02\u9580\u30a2\u30ca\u30ea\u30b9\u30c8\u306e\u5206\u6790<\/h3>\n<div class=\"ai-summary-content\">\n<p>\u672c\u8ad6\u6587\u306f\u3001\u73fe\u5728\u306eAI\u7814\u7a76\u306b\u304a\u3051\u308b\u4e3b\u8981\u306a\u8ab2\u984c\u3067\u3042\u308b\u9ad8\u5ea6\u306a\u6a5f\u68b0\u77e5\u80fd\u306e\u9054\u6210\u306b\u5411\u3051\u3066\u3001\u751f\u7269\u5b66\u7684\u30b7\u30b9\u30c6\u30e0\u304c\u6301\u3064\u9069\u5fdc\u7684\u3067\u76ee\u6a19\u6307\u5411\u7684\u306a\u884c\u52d5\u6226\u7565\u306b\u7740\u76ee\u3057\u305f\u3001\u771f\u306b\u751f\u547d\u306b\u7740\u60f3\u3092\u5f97\u305f\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u63d0\u5531\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u751f\u7269\u5b66\u7684\u9032\u5316\u306f\u3001\u9811\u5065\u6027\u3001\u81ea\u5f8b\u6027\u3001\u305d\u3057\u3066\u591a\u69d8\u306a\u30b9\u30b1\u30fc\u30eb\u3067\u306e\u30aa\u30fc\u30d7\u30f3\u30a8\u30f3\u30c9\u306a\u554f\u984c\u89e3\u6c7a\u3092\u53ef\u80fd\u306b\u3059\u308b\u77e5\u80fd\u306e\u300c\u30ec\u30b7\u30d4\u300d\u3092\u767a\u898b\u3057\u305f\u3068\u8ad6\u3058\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u30ec\u30b7\u30d4\u306f\u3001\u591a\u30b9\u30b1\u30fc\u30eb\u306e\u81ea\u5f8b\u6027\u3001\u80fd\u52d5\u7684\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306e\u81ea\u5df1\u96c6\u5408\u306b\u3088\u308b\u6210\u9577\u3001\u80fd\u529b\u306e\u7d99\u7d9a\u7684\u306a\u518d\u69cb\u7bc9\u3001\u7269\u7406\u7684\u304a\u3088\u3073\u8eab\u4f53\u7684\u5236\u7d04\u306e\u6d3b\u7528\u3001\u305d\u3057\u3066\u81ea\u5df1\u7d44\u7e54\u5316\u3068\u76ee\u6a19\u304b\u3089\u306e\u30c8\u30c3\u30d7\u30c0\u30a6\u30f3\u5236\u5fa1\u3092\u53ef\u80fd\u306b\u3059\u308b\u5e83\u7bc4\u306a\u30b7\u30b0\u30ca\u30eb\u4f1d\u9054\u3068\u3044\u3063\u305f5\u3064\u306e\u8a2d\u8a08\u539f\u5247\u306b\u57fa\u3065\u3044\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u308c\u3089\u306e\u539f\u5247\u306f\u3001\u73fe\u5728\u306eAI\u30d1\u30e9\u30c0\u30a4\u30e0\u3068\u306f\u5bfe\u7167\u7684\u3067\u3042\u308a\u3001\u5c06\u6765\u306e\u81ea\u5f8b\u7684\u3067\u3001\u8eab\u4f53\u6027\u3092\u6301\u3061\u3001\u56de\u5fa9\u529b\u306e\u3042\u308b\u4eba\u5de5\u30b7\u30b9\u30c6\u30e0\u306b\u7d71\u5408\u3059\u308b\u305f\u3081\u306e\u9053\u7b4b\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u77e5\u80fd\u306f\u67d4\u8edf\u306a\u554f\u984c\u89e3\u6c7a\u3068\u3057\u3066\u6349\u3048\u3089\u308c\u3001\u300c\u8a8d\u77e5\u30e9\u30a4\u30c8\u30b3\u30fc\u30f3\u300d\u3068\u3044\u3046\u6982\u5ff5\u3092\u7528\u3044\u3066\u3001\u751f\u547d\u30b7\u30b9\u30c6\u30e0\u3068\u6a5f\u68b0\u306b\u304a\u3051\u308b\u77e5\u80fd\u306e\u9023\u7d9a\u4f53\u304c\u7279\u5fb4\u3065\u3051\u3089\u308c\u307e\u3059\u3002<\/p>\n<p>\ud83d\udc49 <strong><a href=\"https:\/\/arxiv.org\/abs\/2602.08079\" target=\"_blank\" rel=\"noopener\">arXiv \u3067\u8a18\u4e8b\u5168\u6587\u3092\u8aad\u3080<\/a><\/strong><\/p>\n<\/div>\n<ul>\n<li><strong>\u8981\u70b9:<\/strong> A life-inspired approach to AI, focusing on biological principles like multiscale autonomy and self-assemblage, offers a promising alternative to current AI paradigms for achieving robust and creative machine intelligence.<\/li>\n<li><strong>\u8457\u8005:<\/strong> Giovanni Pezzulo, Michael Levin<\/li>\n<\/ul>\n<blockquote class=\"wp-block-quote\"><p><span>English Summary:<\/span><\/p>\n<p>This paper advocates for a genuinely life-inspired approach to machine intelligence, drawing on the adaptive and goal-directed behavioral strategies found in biological systems, which remain a central challenge in current AI research.<\/p>\n<p>It is argued that biological evolution has discovered a scalable recipe for intelligence that enables robustness, autonomy, and open-ended problem-solving across diverse scales. This recipe is based on five design principles: multiscale autonomy, growth through self-assemblage of active components, continuous reconstruction of capabilities, exploitation of physical and embodied constraints, and pervasive signaling enabling self-organization and top-down control from goals.<\/p>\n<p>These principles contrast with current AI paradigms and outline pathways for integrating them into future autonomous, embodied, and resilient artificial systems. Intelligence is framed as flexible problem-solving, and the concept of \"cognitive light cones\" is used to characterize the continuum of intelligence in living systems and machines.<\/p>\n<\/blockquote>\n<\/div>\n<div class=\"wp-block-group\" style=\"margin-top:40px;margin-bottom:40px\">\n<h2 class=\"wp-block-heading\">OpenClaw\u306eAI\u300c\u30b9\u30ad\u30eb\u300d\u62e1\u5f35\u6a5f\u80fd\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u60aa\u5922<\/h2>\n<ul>\n<li><strong>\u539f\u984c:<\/strong> OpenClaw\u2019s AI \u2018skill\u2019 extensions are a security nightmare<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">\u5c02\u9580\u30a2\u30ca\u30ea\u30b9\u30c8\u306e\u5206\u6790<\/h3>\n<div class=\"ai-summary-content\">\n<p>\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u306eAI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u3042\u308b<strong>OpenClaw<\/strong>\uff08\u65e7\u79f0<strong>Clawdbot<\/strong>\u3001<strong>Moltbot<\/strong>\uff09\u306f\u3001\u305d\u306e\u5229\u4fbf\u6027\u306b\u3082\u304b\u304b\u308f\u3089\u305a\u3001\u6df1\u523b\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u3092\u62b1\u3048\u3066\u3044\u307e\u3059\u3002\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u308b135,000\u4ee5\u4e0a\u306e<strong>OpenClaw<\/strong>\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u304c\u767a\u898b\u3055\u308c\u3066\u304a\u308a\u3001\u305d\u306e\u591a\u304f\u304c\u30c7\u30d5\u30a9\u30eb\u30c8\u8a2d\u5b9a\u306e\u307e\u307e\u3001\u8a8d\u8a3c\u306a\u3057\u3067\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u3067\u3042\u308b\u3053\u3068\u304c\u5224\u660e\u3057\u307e\u3057\u305f\u3002<\/p>\n<p><strong>OpenClaw<\/strong>\u306e\u300c\u30b9\u30ad\u30eb\u30b9\u30c8\u30a2\u300d\uff08<strong>ClawHub<\/strong>\uff09\u306b\u306f\u3001\u60aa\u610f\u306e\u3042\u308b\u62e1\u5f35\u6a5f\u80fd\u304c\u591a\u6570\u5b58\u5728\u3057\u3001API\u30ad\u30fc\u3001\u500b\u4eba\u60c5\u5831\u3001\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\u60c5\u5831\u306a\u3069\u306e\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3092\u7a83\u53d6\u3059\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u308c\u307e\u3067\u306b\u3001<strong>OpenClaw<\/strong>\u306b\u95a2\u9023\u3059\u308b\u8907\u6570\u306e\u8106\u5f31\u6027\uff08<strong>CVE<\/strong>\uff09\u304c\u5831\u544a\u3055\u308c\u3066\u304a\u308a\u3001\u4e00\u90e8\u306e\u30b9\u30ad\u30eb\u306f\u6570\u5343\u56de\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><strong>OpenClaw<\/strong>\u306f\u3001\u30b7\u30a7\u30eb\u30b3\u30de\u30f3\u30c9\u306e\u5b9f\u884c\u3001\u30d5\u30a1\u30a4\u30eb\u306e\u8aad\u307f\u66f8\u304d\u3001\u30b9\u30af\u30ea\u30d7\u30c8\u306e\u5b9f\u884c\u306a\u3069\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3057\u3066\u5e83\u7bc4\u306a\u6a29\u9650\u3092\u6301\u3064\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3053\u306e\u305f\u3081\u3001\u8a2d\u5b9a\u30df\u30b9\u3084\u60aa\u610f\u306e\u3042\u308b\u30b9\u30ad\u30eb\u304c\u539f\u56e0\u3067\u3001\u6df1\u523b\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u3064\u306a\u304c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u306e\u554f\u984c\u306b\u5bfe\u51e6\u3059\u308b\u305f\u3081\u3001<strong>OpenClaw<\/strong>\u306f<strong>VirusTotal<\/strong>\u3068\u63d0\u643a\u3057\u3001\u30b9\u30ad\u30eb\u30de\u30fc\u30b1\u30c3\u30c8\u30d7\u30ec\u30a4\u30b9\u3067\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3055\u308c\u308b\u62e1\u5f35\u6a5f\u80fd\u306e\u30b9\u30ad\u30e3\u30f3\u3092\u5f37\u5316\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\ud83d\udc49 <strong><a href=\"https:\/\/www.theverge.com\/news\/874011\/openclaw-ai-skill-clawhub-extensions-security-nightmare\" target=\"_blank\" rel=\"noopener\">The Register \/ SecurityScorecard \u3067\u8a18\u4e8b\u5168\u6587\u3092\u8aad\u3080<\/a><\/strong><\/p>\n<\/div>\n<ul>\n<li><strong>\u8981\u70b9:<\/strong> Open-source AI agent platforms like OpenClaw, while powerful, pose significant security risks due to widespread vulnerabilities, default insecure configurations, and malicious extensions in their marketplaces, necessitating robust security measures and user vigilance.<\/li>\n<li><strong>\u8457\u8005:<\/strong> Emma Roth \/ Editorial Staff<\/li>\n<\/ul>\n<blockquote class=\"wp-block-quote\"><p><span>English Summary:<\/span><\/p>\n<p>The open-source AI agent platform <strong>OpenClaw<\/strong> (formerly <strong>Clawdbot<\/strong> and <strong>Moltbot<\/strong>) presents significant security risks despite its convenience. Over 135,000 internet-exposed <strong>OpenClaw<\/strong> instances have been discovered, many accessible without authentication due to default settings.<\/p>\n<p>The <strong>OpenClaw<\/strong> \"skill store\" (<strong>ClawHub<\/strong>) is riddled with malicious extensions capable of stealing sensitive data such as API keys, personal information, and credit card details. Multiple vulnerabilities (<strong>CVEs<\/strong>) related to <strong>OpenClaw<\/strong> have been reported, with some malicious skills downloaded thousands of times.<\/p>\n<p><strong>OpenClaw<\/strong> can execute shell commands, read\/write files, and run scripts, granting it extensive privileges on user systems. This capability makes it susceptible to severe security incidents if misconfigured or if malicious skills are installed. In response, <strong>OpenClaw<\/strong> has partnered with <strong>VirusTotal<\/strong> to enhance the scanning of extensions uploaded to its skill marketplace.<\/p>\n<\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u5927\u898f\u6a21\u8a00\u8a9e\u30e2\u30c7\u30eb\u3068\u4eba\u9593\u306e\u8133\u306e\u95a2\u9023\u6027\u3001\u751f\u547d\u306e\u539f\u7406\u306b\u57fa\u3065\u304fAI\u958b\u767a\u3001\u305d\u3057\u3066OpenClaw\u306e\u3088\u3046\u306aAI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u306b\u95a2\u3059\u308b\u6700\u65b0\u306e\u7814\u7a76\u3068\u30cb\u30e5\u30fc\u30b9\u3092\u8981\u7d04\u3002<\/p>\n","protected":false},"author":1,"featured_media":856,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"vkexunit_cta_each_option":"","footnotes":""},"categories":[3],"tags":[8,17,156,45,61,15,35],"class_list":{"0":"post-923","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-columns","8":"tag-ai","10":"tag-156","12":"tag-61","14":"tag-35"},"_links":{"self":[{"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/posts\/923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/comments?post=923"}],"version-history":[{"count":0,"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/posts\/923\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/media\/856"}],"wp:attachment":[{"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/media?parent=923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/categories?post=923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itexplore.org\/jp\/wp-json\/wp\/v2\/tags?post=923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}