| ▲ | rvz 8 hours ago | |
Exfiltrated without a Pwn2Own in 2 days of release and 1 day after my comment [0], despite "sandboxes", "VMs", "bubblewrap" and "allowlists". Exploited with a basic prompt injection attack. Prompt injection is the new RCE. | ||
| ▲ | tempaccsoz5 2 hours ago | parent | next [-] | |
Now, with our ALL NEW Agent Desktop High Tech System™, you too can experience prompt injection! Plus, at no extra cost, we'll include the fabled RCE feature - brought to you by prompt injection and desktop access. Available NOW in all good frontier models and agentic frameworks! | ||
| ▲ | ramoz 8 hours ago | parent | prev [-] | |
Sandboxes are an overhyped buzzword of 2026. We wanna be able to do meaningful things with agents. Even in remote instances, we want to be able to connect agents to our data. I think there's a lot of over-engineering going there & there are simpler wins to protect the file system, otherwise there are more important things we need to focus on. Securing autonomous, goal-oriented AI Agents presents inherent challenges that necessitate a departure from traditional application or network security models. The concept of containment (sandboxing) for a highly adaptive, intelligent entity is intrinsically limited. A sufficiently sophisticated agent, operating with defined goals and strategic planning, possesses the capacity to discover and exploit vulnerabilities or circumvent established security perimeters. | ||