Great talk describing the myriad ways coding agents can be re-directed to do stuff they shouldn’t via prompt Injections. Especially nice, changing to yolo-mode so the human in the loop is no longer asked for confirmation of potentially harmful operations (by @wuzzi23.bsky.social at #39c3)
Posts by Johann Rehberger
Ahoy! 🏴☠️
Claude got network access.
When enabled, it can also communicate with Anthropic APIs!
Twist: Attacker sets their own API key in prompt injection payload to upload user's data to their account 🔥
embracethered.com/blog/posts/2...
Great series, kudos.
To rephrase the old joke: the S in VIBE coding stands for Security.
AgentHopper: An AI Virus
Month of AI Bugs Season Finale - Enjoy! 🍿
embracethered.com/blog/posts/2...
Episode 26: AWS Kiro
Arbitrary Code Execution via Indirect Prompt Injection
embracethered.com/blog/posts/2...
Episode 25: Manus
How Prompt Injection Exposes Manus' VS Code Server to the Internet
embracethered.com/blog/posts/2...
Episode 23: Windsurf
Sneaking Invisible Instructions by Developers in Windsurf
embracethered.com/blog/posts/2...
Episode 22: Windsurf
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
embracethered.com/blog/posts/2...
Episode 21: Hijacking Windsurf
How Prompt Injection Leaks Developer Secrets
embracethered.com/blog/posts/2...
Episode 19: Amazon Q Developer
Remote Code Execution with Prompt Injection
embracethered.com/blog/posts/2...
Episode 18: Amazon Q Developer
Amazon Q Developer: Secrets Leaked via DNS and Prompt Injection
embracethered.com/blog/posts/2...
Episode 17: Amp
Data Exfiltration via Image Rendering Fixed in Amp Code
embracethered.com/blog/posts/2...
Episode 16: Amp code
Invisible Prompt Injection Fixed by Sourcegraph
embracethered.com/blog/posts/2...
👉 Episode 15: Google Jules
Google Jules is Vulnerable To Invisible Prompt Injection
embracethered.com/blog/posts/2...
👉 Episode 14: Google Jules
Jules Zombie Agent: From Prompt Injection to Remote Control
embracethered.com/blog/posts/2...
👉 Episode 13: Google Jules
Vulnerable to Multiple Data Exfiltration Issues with prompt injection
embracethered.com/blog/posts/2...
Great summary by @simonwillison.net of @wuzzi23.bsky.social ‘s findings on AI tools vulnerabilities.
In short, all AI tools are vulnerable if one attaches external files and links to their prompts, leading to secrets leaks and remote code execution.
Johann publishes daily until the end of the month.
💥 Remote Code Execution in GitHub Copilot (CVE-2025-53773)
👉 Prompt injection exploit writes to Copilot config file & puts it into YOLO mode, and we get immediate RCE
🔥 Bypasses all user approvals
🛡️ Patch is out today. Update before someone else does it for you
embracethered.com/blog/posts/2...
Episode 10
ZombAI Exploit with OpenHands: Prompt Injection To Remote Code Execution
embracethered.com/blog/posts/2...
Episode 9
OpenHands and the Lethal Trifecta: How Prompt Injection Can Leak Access Tokens
embracethered.com/blog/posts/2...
Episode 8
AI Kill Chain in Action: Devin AI Exposes Ports to the Internet with Prompt Injection
embracethered.com/blog/posts/2...
Episode 6
Spent $500 To Test Devin AI For Prompt Injection So That You Don't Have To
embracethered.com/blog/posts/2...
Episode 5
Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
New novel TTP!
embracethered.com/blog/posts/2...
Episode 4
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
embracethered.com/blog/posts/2...
Episode 3
Anthropic Filesystem MCP Server: Directory Access Bypass via Improper Path Validation
embracethered.com/blog/posts/2...