Great series, kudos.
To rephrase the old joke: the S in VIBE coding stands for Security.
@wuzzi23.bsky.social
Great series, kudos.
To rephrase the old joke: the S in VIBE coding stands for Security.
AgentHopper: An AI Virus
Month of AI Bugs Season Finale - Enjoy! ๐ฟ
embracethered.com/blog/posts/2...
Episode 26: AWS Kiro
Arbitrary Code Execution via Indirect Prompt Injection
embracethered.com/blog/posts/2...
Episode 25: Manus
How Prompt Injection Exposes Manus' VS Code Server to the Internet
embracethered.com/blog/posts/2...
Episode 24: How Deep Research Agents Can Leak Your Data
embracethered.com/blog/posts/2...
Episode 23: Windsurf
Sneaking Invisible Instructions by Developers in Windsurf
embracethered.com/blog/posts/2...
Episode 22: Windsurf
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
embracethered.com/blog/posts/2...
Episode 21: Hijacking Windsurf
How Prompt Injection Leaks Developer Secrets
embracethered.com/blog/posts/2...
Episode 19: Amazon Q Developer
Remote Code Execution with Prompt Injection
embracethered.com/blog/posts/2...
Episode 18: Amazon Q Developer
Amazon Q Developer: Secrets Leaked via DNS and Prompt Injection
embracethered.com/blog/posts/2...
Episode 17: Amp
Data Exfiltration via Image Rendering Fixed in Amp Code
embracethered.com/blog/posts/2...
Episode 16: Amp code
Invisible Prompt Injection Fixed by Sourcegraph
embracethered.com/blog/posts/2...
๐ Episode 15: Google Jules
Google Jules is Vulnerable To Invisible Prompt Injection
embracethered.com/blog/posts/2...
๐ Episode 14: Google Jules
Jules Zombie Agent: From Prompt Injection to Remote Control
embracethered.com/blog/posts/2...
๐ Episode 13: Google Jules
Vulnerable to Multiple Data Exfiltration Issues with prompt injection
embracethered.com/blog/posts/2...
Great summary by @simonwillison.net of @wuzzi23.bsky.social โs findings on AI tools vulnerabilities.
In short, all AI tools are vulnerable if one attaches external files and links to their prompts, leading to secrets leaks and remote code execution.
Johann publishes daily until the end of the month.
๐ฅ Remote Code Execution in GitHub Copilot (CVE-2025-53773)
๐ Prompt injection exploit writes to Copilot config file & puts it into YOLO mode, and we get immediate RCE
๐ฅ Bypasses all user approvals
๐ก๏ธ Patch is out today. Update before someone else does it for you
embracethered.com/blog/posts/2...
Episode 11
Claude Code: Data Exfiltration with DNS
embracethered.com/blog/posts/2...
Episode 10
ZombAI Exploit with OpenHands: Prompt Injection To Remote Code Execution
embracethered.com/blog/posts/2...
Episode 9
OpenHands and the Lethal Trifecta: How Prompt Injection Can Leak Access Tokens
embracethered.com/blog/posts/2...
Episode 8
AI Kill Chain in Action: Devin AI Exposes Ports to the Internet with Prompt Injection
embracethered.com/blog/posts/2...
Episode 7
How Devin AI Can Leak Your Secrets via Multiple Means
embracethered.com/blog/posts/2...
Episode 6
Spent $500 To Test Devin AI For Prompt Injection So That You Don't Have To
embracethered.com/blog/posts/2...
Episode 5
Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
New novel TTP!
embracethered.com/blog/posts/2...
Episode 4
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
embracethered.com/blog/posts/2...
Episode 3
Anthropic Filesystem MCP Server: Directory Access Bypass via Improper Path Validation
embracethered.com/blog/posts/2...
Episode 2
Turning ChatGPT Codex Into A ZombAI Agent
embracethered.com/blog/posts/2...
Episode 1:
Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection
embracethered.com/blog/posts/2...
monthofaibugs.com
31.07.2025 08:30 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0