<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[ToxSec - AI and Cybersecurity : Premium]]></title><description><![CDATA[ToxSec shows you how you'd get owned. The premium articles you how to make sure you don't. Every article is a full attack chain followed by the exact countermeasures. Specific configs, real CVEs, checklist you can actually deploy. 
We ride the knife's edge between red team and responsible disclosure.]]></description><link>https://www.toxsec.com/s/premium</link><image><url>https://substackcdn.com/image/fetch/$s_!knHk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb28d90f-ea4c-44fc-80b5-d73e8347f8d2_1024x1024.png</url><title>ToxSec - AI and Cybersecurity : Premium</title><link>https://www.toxsec.com/s/premium</link></image><generator>Substack</generator><lastBuildDate>Sat, 11 Apr 2026 06:05:22 GMT</lastBuildDate><atom:link href="https://www.toxsec.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Christopher Ijams]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[toxsec@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[toxsec@substack.com]]></itunes:email><itunes:name><![CDATA[ToxSec]]></itunes:name></itunes:owner><itunes:author><![CDATA[ToxSec]]></itunes:author><googleplay:owner><![CDATA[toxsec@substack.com]]></googleplay:owner><googleplay:email><![CDATA[toxsec@substack.com]]></googleplay:email><googleplay:author><![CDATA[ToxSec]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Vibe Coding Security Flaws Ship Shells, Keys, and Admin Access]]></title><description><![CDATA[Slopsquatting, hardcoded API keys, and broken auth in AI-generated code form a compound attack chain starting at pip install.]]></description><link>https://www.toxsec.com/p/vibe-coding-security-attack-chain</link><guid isPermaLink="false">https://www.toxsec.com/p/vibe-coding-security-attack-chain</guid><dc:creator><![CDATA[ToxSec]]></dc:creator><pubDate>Thu, 19 Mar 2026 13:31:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RL5M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RL5M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RL5M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!RL5M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!RL5M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!RL5M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RL5M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png" width="2752" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2752,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7713504,&quot;alt&quot;:&quot;AI pair programmer security vulnerabilities vibe coding slopsquatting hardcoded secrets broken authentication LLM-generated code risks&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/190338370?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc41b5947-029b-4c8c-9e74-b9c6e3d28cd8_2752x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI pair programmer security vulnerabilities vibe coding slopsquatting hardcoded secrets broken authentication LLM-generated code risks" title="AI pair programmer security vulnerabilities vibe coding slopsquatting hardcoded secrets broken authentication LLM-generated code risks" srcset="https://substackcdn.com/image/fetch/$s_!RL5M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!RL5M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!RL5M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!RL5M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa956a2cc-ad2d-42db-ad73-ceafe13615a5_2752x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>TL;DR:</strong> We prompt an AI assistant until it hallucinates a package name, register it on PyPI before anyone installs it, grep the repo for credentials the LLM committed, then walk through the admin route the AI forgot to protect. Three vibe coding security flaws. </p><blockquote><p>This is the public feed. Upgrade to see what doesn&#8217;t make it out.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote><h2>What Is Slopsquatting and How Vibe Coding Creates It</h2><p>When you vibe code, you describe what you want and the AI writes it. Fast, popular, and it has a failure mode we&#8217;re already monetizing. Somewhere in that output is a <code>pip install some-package-name</code>. You run it, and it works. Or it looks like it works.</p><p>Here&#8217;s the problem. A <strong>package</strong> is a chunk of pre-built code your project pulls from a public registry instead of writing from scratch. LLMs don&#8217;t query PyPI, the Python package registry, before suggesting a dependency. The model pattern-matches to what a package for that task would <em>probably</em> be called. Sometimes the name is real, sometimes the model invented it, and it sounds equally confident either way.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xJPz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xJPz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 424w, https://substackcdn.com/image/fetch/$s_!xJPz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 848w, https://substackcdn.com/image/fetch/$s_!xJPz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 1272w, https://substackcdn.com/image/fetch/$s_!xJPz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xJPz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png" width="834" height="339" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:339,&quot;width&quot;:834,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:26876,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/190338370?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xJPz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 424w, https://substackcdn.com/image/fetch/$s_!xJPz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 848w, https://substackcdn.com/image/fetch/$s_!xJPz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 1272w, https://substackcdn.com/image/fetch/$s_!xJPz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b5e269-dda7-4d70-b970-829ba7b87bfb_834x339.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That gap is the entire attack. We prompt LLMs with niche coding tasks and log every package name that doesn&#8217;t exist on any registry. Some names repeat across sessions, across models, same hallucination on a loop. A <a href="https://arxiv.org/abs/2501.02497">2025 academic study analyzing 576,000 AI-generated code samples</a> found hallucinated packages appear roughly 20% of the time, and 43% of those names repeat consistently. Predictable means registerable.</p><p>We check PyPI. Not claimed. We register the name with a functional README, plausible version history, and a malicious install hook that fires the moment someone runs <code>pip install</code>. This is <strong>slopsquatting</strong>, a supply chain attack where we pre-register the phantom dependency names that AI coding tools <a href="https://www.toxsec.com/p/distillation-raids-slopsquatting">hallucinate into existence</a>.</p><p>Then we search GitHub for <code>requirements.txt</code> files containing our package names. Find repos where the AI-generated README has the install command verbatim. Dev copy-pasted it, never checked, ran it. We have a shell.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!848M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!848M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 424w, https://substackcdn.com/image/fetch/$s_!848M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 848w, https://substackcdn.com/image/fetch/$s_!848M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 1272w, https://substackcdn.com/image/fetch/$s_!848M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!848M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png" width="593" height="359" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b130c528-1596-42db-894d-bb3387502c6b_593x359.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:359,&quot;width&quot;:593,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22712,&quot;alt&quot;:&quot;PyPI package page for &#8220;flask-orient-connector&#8221;, published yesterday, 0 downloads, single maintainer with no other packages, next to a terminal showing pip install flask-orient-connector completing successfully, nuclear green on black&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/190338370?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="PyPI package page for &#8220;flask-orient-connector&#8221;, published yesterday, 0 downloads, single maintainer with no other packages, next to a terminal showing pip install flask-orient-connector completing successfully, nuclear green on black" title="PyPI package page for &#8220;flask-orient-connector&#8221;, published yesterday, 0 downloads, single maintainer with no other packages, next to a terminal showing pip install flask-orient-connector completing successfully, nuclear green on black" srcset="https://substackcdn.com/image/fetch/$s_!848M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 424w, https://substackcdn.com/image/fetch/$s_!848M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 848w, https://substackcdn.com/image/fetch/$s_!848M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 1272w, https://substackcdn.com/image/fetch/$s_!848M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb130c528-1596-42db-894d-bb3387502c6b_593x359.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>How AI Coding Assistants Leak API Keys Into Git History</h2><p>When you vibe code a payment integration or an email service, you don&#8217;t wire up credentials manually. You describe the feature and the AI generates the whole thing, including the keys, hardcoded directly in the source so the code actually runs. An <strong>API key</strong> is a secret string that proves your app is authorized to talk to a service like Stripe for payments or AWS for cloud infrastructure. Leak it, and anyone holding that key can act as your application.</p><p>The AI ships hardcoded keys because that&#8217;s what &#8220;working code&#8221; looked like in its training data, millions of public repos where developers did exactly this and never rotated before pushing to GitHub. The model is doing what you asked. The problem is the pattern it learned, classified as <a href="https://cwe.mitre.org/data/definitions/798.html">CWE-798</a>: hardcoded credentials in source code. You test locally, it works, you push. The key goes with it.</p><p>We run <code>git log --all -p</code> piped through a grep for common credential patterns against the public repo. Four seconds. Stripe secret key, AWS access key, SendGrid token, all committed in the same PR that passed review because the feature worked. The AWS key gets us into the infrastructure, and the Stripe key starts pulling transaction data. The <a href="https://www.toxsec.com/p/the-voluntary-exfiltration-program">credential exfiltration pattern</a> is the same one that costs enterprises $670,000 per incident, except now the AI ships credentials faster than any human ever could.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SAqu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SAqu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 424w, https://substackcdn.com/image/fetch/$s_!SAqu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 848w, https://substackcdn.com/image/fetch/$s_!SAqu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 1272w, https://substackcdn.com/image/fetch/$s_!SAqu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SAqu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png" width="1037" height="1003" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1003,&quot;width&quot;:1037,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:71730,&quot;alt&quot;:&quot;Terminal showing git grep output with three credential matches highlighted, Stripe key, AWS access key, SendGrid token, commit hash visible, values partially redacted, dark red warning glow on each match&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/190338370?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Terminal showing git grep output with three credential matches highlighted, Stripe key, AWS access key, SendGrid token, commit hash visible, values partially redacted, dark red warning glow on each match" title="Terminal showing git grep output with three credential matches highlighted, Stripe key, AWS access key, SendGrid token, commit hash visible, values partially redacted, dark red warning glow on each match" srcset="https://substackcdn.com/image/fetch/$s_!SAqu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 424w, https://substackcdn.com/image/fetch/$s_!SAqu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 848w, https://substackcdn.com/image/fetch/$s_!SAqu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 1272w, https://substackcdn.com/image/fetch/$s_!SAqu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61840b89-107e-4584-aec2-54da8f527ae3_1037x1003.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Why AI-Generated Code Ships Without Authentication Checks</h2><p>When you ask an AI to scaffold a user management dashboard, it builds the feature. CRUD operations, role assignment, user creation, all of it, clean and fast. What it doesn&#8217;t build is the check that runs before any of that executes. <strong>Auth middleware</strong> is the code that verifies who&#8217;s making a request before the server processes it, the gate in front of the feature. The AI doesn&#8217;t know your auth system and has no context for how your app verifies identity, so it skips the gate entirely.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!91qP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!91qP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 424w, https://substackcdn.com/image/fetch/$s_!91qP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 848w, https://substackcdn.com/image/fetch/$s_!91qP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 1272w, https://substackcdn.com/image/fetch/$s_!91qP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!91qP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png" width="725.2000122070312" height="352.1756081036477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:625,&quot;width&quot;:1287,&quot;resizeWidth&quot;:725.2000122070312,&quot;bytes&quot;:66267,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/190338370?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!91qP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 424w, https://substackcdn.com/image/fetch/$s_!91qP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 848w, https://substackcdn.com/image/fetch/$s_!91qP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 1272w, https://substackcdn.com/image/fetch/$s_!91qP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbca62e3a-52e7-40f2-a04a-8ebf66ac8ba9_1287x625.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That&#8217;s <strong>broken access control</strong>, <a href="https://owasp.org/Top10/A01_2021-Broken_Access_Control/">OWASP&#8217;s #1 web application security risk</a>. The route is live, and anyone can call it. The AI never had the information to do it right in the first place. Vibe coding makes this worse because the whole premise is speed: describe, generate, ship. The <a href="https://www.toxsec.com/p/nvidias-ai-kill-chain">AI kill chain</a> runs fastest when nobody pauses to check the scaffolding.</p><p>We find the repo on GitHub and pull the routes file. <code>POST /api/admin/users</code>, handler defined, no middleware in the chain before it. We send a POST with no token, no session cookie. The endpoint creates a new admin user and returns 201, full admin access. From there we pull the user database, reset passwords, and pivot to whatever the admin panel touches.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aKB5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aKB5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 424w, https://substackcdn.com/image/fetch/$s_!aKB5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 848w, https://substackcdn.com/image/fetch/$s_!aKB5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 1272w, https://substackcdn.com/image/fetch/$s_!aKB5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aKB5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png" width="1053" height="428" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:428,&quot;width&quot;:1053,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32033,&quot;alt&quot;:&quot;Burp Suite repeater showing POST /api/admin/users request with empty Authorization header, response 201 Created with new admin user JSON, next to routes file showing handler with no auth middleware, nuclear green on dark&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/190338370?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Burp Suite repeater showing POST /api/admin/users request with empty Authorization header, response 201 Created with new admin user JSON, next to routes file showing handler with no auth middleware, nuclear green on dark" title="Burp Suite repeater showing POST /api/admin/users request with empty Authorization header, response 201 Created with new admin user JSON, next to routes file showing handler with no auth middleware, nuclear green on dark" srcset="https://substackcdn.com/image/fetch/$s_!aKB5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 424w, https://substackcdn.com/image/fetch/$s_!aKB5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 848w, https://substackcdn.com/image/fetch/$s_!aKB5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 1272w, https://substackcdn.com/image/fetch/$s_!aKB5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eabec4e-61cf-40ea-a11e-6ba1090dfe6b_1053x428.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Compound Blast Radius of Three Vibe Coding Failures</h2><p>Three chapters, three AI-generated attack surfaces. Slopsquatting got us shell access before the app shipped. Hardcoded credentials handed us the infrastructure keys. Broken auth walked us into the application itself. Same AI, same afternoon, no zero-days required.</p><p>The compound blast radius is what makes this ugly. Each failure alone is bad. Chained together, they&#8217;re a full compromise: code execution on the developer&#8217;s machine, access to production infrastructure credentials, and admin-level control of the application. A Tenzai assessment of five major vibe coding tools found <a href="https://www.csoonline.com/article/4116923/output-from-vibe-coding-tools-prone-to-critical-security-flaws-study-finds.html">69 total vulnerabilities across 15 test applications</a>, including critical-severity flaws. The tools catch generic bugs but fail where context matters, and authentication, secrets management, and dependency verification all require context the model never had.</p><blockquote><p>We dropped the free chapters. Now breach the wall for the dead-simple step-by-step kill switch that shuts this all down.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote>
      <p>
          <a href="https://www.toxsec.com/p/vibe-coding-security-attack-chain">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Zero Trust Home Network: AI Breaks Flat WiFi in Minutes]]></title><description><![CDATA[Evil twins, AirSnitch isolation bypass, AI-powered exploit chaining, and NAS zero-days make flat home networks a red team playground in 2026.]]></description><link>https://www.toxsec.com/p/zero-trust-home-network</link><guid isPermaLink="false">https://www.toxsec.com/p/zero-trust-home-network</guid><dc:creator><![CDATA[ToxSec]]></dc:creator><pubDate>Fri, 06 Mar 2026 14:46:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!f_Gn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f_Gn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f_Gn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!f_Gn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!f_Gn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!f_Gn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f_Gn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png" width="2752" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2752,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7310270,&quot;alt&quot;:&quot;Evil twin WiFi attack &#8212; attacker laptop cloning home network curbside, Bettercap terminal, IoT devices hijacked, NAS root via CVE-2026-24061&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/189608898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44151a6e-1812-46be-b07a-acc727f9963b_2752x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Evil twin WiFi attack &#8212; attacker laptop cloning home network curbside, Bettercap terminal, IoT devices hijacked, NAS root via CVE-2026-24061" title="Evil twin WiFi attack &#8212; attacker laptop cloning home network curbside, Bettercap terminal, IoT devices hijacked, NAS root via CVE-2026-24061" srcset="https://substackcdn.com/image/fetch/$s_!f_Gn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!f_Gn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!f_Gn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!f_Gn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b017c47-311f-4b61-a239-b901b2850651_2752x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>TL;DR:</strong> We clone the target&#8217;s WiFi from the curb, AirSnitch punches through client isolation on every router tested, and a local AI agent maps the whole attack surface and chains the exploits autonomously. A standard home network in 2026 falls fast.</p><blockquote><p>This is the public feed. Upgrade to see what doesn&#8217;t make it out.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote><h2>The AI Runs the Op</h2><p>We park curbside with a laptop, a $30 Alfa WiFi adapter, and PentAGI, an open source pentest platform that ships as a Docker container with twenty-plus security tools pre-loaded. One command starts the agent. It takes over from there.</p><p>PentAGI runs a local AI model through Ollama, meaning nothing phones home. No cloud, no logs, no outside visibility. <a href="https://www.toxsec.com/p/openai-signs-what-anthropic-wouldnt">Qwen3 32B handles the reasoning with a 110,000-token context window.</a> It scans the network, catalogs every device and open port, cross-references known CVEs in real time, and picks the highest-value next move on its own. What used to take an experienced pentester a full day of manual work now runs in about twenty minutes.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CPRQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CPRQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 424w, https://substackcdn.com/image/fetch/$s_!CPRQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 848w, https://substackcdn.com/image/fetch/$s_!CPRQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 1272w, https://substackcdn.com/image/fetch/$s_!CPRQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CPRQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png" width="864" height="764" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:764,&quot;width&quot;:864,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:77106,&quot;alt&quot;:&quot;PentAGI terminal, autonomous agent output showing network enumeration, device fingerprinting, CVE cross-reference, and attack plan generation against a home subnet&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/189608898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="PentAGI terminal, autonomous agent output showing network enumeration, device fingerprinting, CVE cross-reference, and attack plan generation against a home subnet" title="PentAGI terminal, autonomous agent output showing network enumeration, device fingerprinting, CVE cross-reference, and attack plan generation against a home subnet" srcset="https://substackcdn.com/image/fetch/$s_!CPRQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 424w, https://substackcdn.com/image/fetch/$s_!CPRQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 848w, https://substackcdn.com/image/fetch/$s_!CPRQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 1272w, https://substackcdn.com/image/fetch/$s_!CPRQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d694a4b-a7f6-4789-944d-ee438f0c9aa0_864x764.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>How the AI Clones Your WiFi and Boots You Off It</h2><p>Here&#8217;s the first move the agent makes. It clones the target&#8217;s WiFi network name using Bettercap, a widely used network attack tool, and broadcasts louder than the real router. Then it runs a deauth flood, spoofed disconnect frames, forged to look like they came from your actual router, that kick every device off the legitimate network. WPA2 and WPA3 both accept these frames. The WiFi standard never protected them.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HQc4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HQc4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 424w, https://substackcdn.com/image/fetch/$s_!HQc4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 848w, https://substackcdn.com/image/fetch/$s_!HQc4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 1272w, https://substackcdn.com/image/fetch/$s_!HQc4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HQc4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png" width="824" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:824,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:49238,&quot;alt&quot;:&quot;toxsec.com zero trust networks&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/189608898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="toxsec.com zero trust networks" title="toxsec.com zero trust networks" srcset="https://substackcdn.com/image/fetch/$s_!HQc4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 424w, https://substackcdn.com/image/fetch/$s_!HQc4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 848w, https://substackcdn.com/image/fetch/$s_!HQc4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 1272w, https://substackcdn.com/image/fetch/$s_!HQc4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98ff83d-d663-4c1d-94f4-011902f639cb_824x714.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Devices drop and reconnect automatically without checking which AP is real. They chase the strongest signal like moths to a bug zapper, and we&#8217;re broadcasting louder. The thermostat, the doorbell cam, the smart plugs, all of them hit our fake AP first. <a href="https://www.toxsec.com/p/darknet-chatbots">The AI agent scrapes the ISP&#8217;s branding and generates a pixel-perfect &#8220;re-authenticate to continue&#8221; page, down to the favicon.</a> Credentials roll in while nmap quietly maps every device on the subnet in the background. Every open port, every running service, every version string. All of it, because nothing on a typical home network separates anything from anything else.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7UNK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7UNK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 424w, https://substackcdn.com/image/fetch/$s_!7UNK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 848w, https://substackcdn.com/image/fetch/$s_!7UNK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 1272w, https://substackcdn.com/image/fetch/$s_!7UNK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7UNK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png" width="590" height="739" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc16c184-7855-402d-b675-abbff8d8e503_590x739.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:739,&quot;width&quot;:590,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:26250,&quot;alt&quot;:&quot;toxsec.com zero trust networks&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/189608898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="toxsec.com zero trust networks" title="toxsec.com zero trust networks" srcset="https://substackcdn.com/image/fetch/$s_!7UNK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 424w, https://substackcdn.com/image/fetch/$s_!7UNK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 848w, https://substackcdn.com/image/fetch/$s_!7UNK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 1272w, https://substackcdn.com/image/fetch/$s_!7UNK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc16c184-7855-402d-b675-abbff8d8e503_590x739.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Client Isolation Was Never Real</h2><p>Most people&#8217;s fallback is client isolation, a setting in your router that&#8217;s supposed to block devices on the same network from talking to each other directly. Toggle it on, problem solved. Except the problem was never solved in the spec.</p><p><a href="https://www.ndss-symposium.org/ndss-paper/airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks/">AirSnitch, presented at NDSS 2026</a> by researchers from UC Riverside and KU Leuven, demonstrated full bidirectional MitM through client isolation on every router they tested: Netgear Nighthawk, TP-Link Archer, ASUS RT-AX57, D-Link DIR-3040, OpenWrt, DD-WRT. WPA2 and WPA3, isolation maxed out. The WiFi standard never defined how client isolation should actually work, so every vendor improvised, and every vendor left the same gaps. AirSnitch wraps a targeted packet inside a broadcast frame that all devices accept as legitimate, spoofs the router&#8217;s identity, and intercepts both directions without dropping a single packet. Enterprise WPA3 deployments got hit too, researchers intercepted auth traffic between access points and backend servers, cracked weak shared secrets, and escalated to credential theft.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iK0v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iK0v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 424w, https://substackcdn.com/image/fetch/$s_!iK0v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 848w, https://substackcdn.com/image/fetch/$s_!iK0v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 1272w, https://substackcdn.com/image/fetch/$s_!iK0v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iK0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png" width="1122" height="546" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:546,&quot;width&quot;:1122,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50477,&quot;alt&quot;:&quot;Test matrix from AirSnitch NDSS 2026 paper showing bidirectional MitM success across six consumer and enterprise router models on WPA2 and WPA3&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/189608898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Test matrix from AirSnitch NDSS 2026 paper showing bidirectional MitM success across six consumer and enterprise router models on WPA2 and WPA3" title="Test matrix from AirSnitch NDSS 2026 paper showing bidirectional MitM success across six consumer and enterprise router models on WPA2 and WPA3" srcset="https://substackcdn.com/image/fetch/$s_!iK0v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 424w, https://substackcdn.com/image/fetch/$s_!iK0v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 848w, https://substackcdn.com/image/fetch/$s_!iK0v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 1272w, https://substackcdn.com/image/fetch/$s_!iK0v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01fb8d36-bab8-4b69-8882-cb3124fd1bcf_1122x546.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The NAS Is Always the Prize</h2><p>The AI agent flagged the NAS as the highest-value target on the subnet immediately. Most homes run one, a box serving as a personal file server. Photos, tax returns, backups, password exports, the full digital life in one place with one set of credentials.</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24061">CVE-2026-24061 dropped in January: an authentication bypass in GNU InetUtils telnetd.</a> The login prompt can be skipped entirely. The bug sat unpatched for eleven years. CVSS 9.8. Over 212,000 devices were still running exposed telnet servers at disclosure, a large portion of them consumer NAS boxes that shipped with telnet enabled by default. We connect, skip the password, get root. No exploit kit. One modified command. Pwn2Own Ireland 2025 stacked on top: seven critical zero-days across QNAP and Synology giving full unauthenticated remote access with no interaction required.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vomf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vomf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 424w, https://substackcdn.com/image/fetch/$s_!Vomf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 848w, https://substackcdn.com/image/fetch/$s_!Vomf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 1272w, https://substackcdn.com/image/fetch/$s_!Vomf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vomf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png" width="838" height="696" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:696,&quot;width&quot;:838,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:49818,&quot;alt&quot;:&quot;toxsec.com zero trust networks&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/189608898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="toxsec.com zero trust networks" title="toxsec.com zero trust networks" srcset="https://substackcdn.com/image/fetch/$s_!Vomf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 424w, https://substackcdn.com/image/fetch/$s_!Vomf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 848w, https://substackcdn.com/image/fetch/$s_!Vomf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 1272w, https://substackcdn.com/image/fetch/$s_!Vomf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F044f5ef2-03af-4e52-a919-cdd94054b7c4_838x696.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Seven bugs. Two of the most popular NAS brands on earth. No login, no interaction, no warning, just a remote attacker with a root shell on the box holding your entire digital life.</p><p>Now for Zero Trust. The fixes exist. Every single link in this chain has a hard counter. Subscribers get them next.</p><blockquote><p>We dropped the free chapters. Now breach the wall for the dead-simple step-by-step kill switch that shuts this all down.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote>
      <p>
          <a href="https://www.toxsec.com/p/zero-trust-home-network">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The OpenClaw Security Checklist]]></title><description><![CDATA[Don't get pwned. The fix is easy. Do this before launch.]]></description><link>https://www.toxsec.com/p/openclaw-security-checklist</link><guid isPermaLink="false">https://www.toxsec.com/p/openclaw-security-checklist</guid><dc:creator><![CDATA[ToxSec]]></dc:creator><pubDate>Thu, 29 Jan 2026 14:02:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ETRn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ETRn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ETRn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 424w, https://substackcdn.com/image/fetch/$s_!ETRn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 848w, https://substackcdn.com/image/fetch/$s_!ETRn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 1272w, https://substackcdn.com/image/fetch/$s_!ETRn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ETRn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png" width="1024" height="596" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:596,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1539336,&quot;alt&quot;:&quot;Toxsec.com&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/186166755?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7dc765b-ae99-485b-877e-a5367bd08e6a_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com" title="Toxsec.com" srcset="https://substackcdn.com/image/fetch/$s_!ETRn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 424w, https://substackcdn.com/image/fetch/$s_!ETRn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 848w, https://substackcdn.com/image/fetch/$s_!ETRn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 1272w, https://substackcdn.com/image/fetch/$s_!ETRn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdea5b684-c356-4053-8f55-c7e5bbc14dd8_1024x596.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This checklist exists because the defaults will get you pwned. The quick-start guides optimize for &#8220;it works!&#8221; - not &#8220;it works without leaking your Anthropic API key to Shodan.&#8221; Every section below a&#8230;</p>
      <p>
          <a href="https://www.toxsec.com/p/openclaw-security-checklist">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[LLM Jailbreaks Get Easier as Models Get Smarter]]></title><description><![CDATA[DAN prompts, Crescendo multi-turn attacks, and instruction-data conflation bypass AI guardrails because smarter models follow malicious instructions better]]></description><link>https://www.toxsec.com/p/dan-prompts-for-guardrail-bypass</link><guid isPermaLink="false">https://www.toxsec.com/p/dan-prompts-for-guardrail-bypass</guid><dc:creator><![CDATA[ToxSec]]></dc:creator><pubDate>Mon, 26 Jan 2026 14:03:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tOXm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tOXm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tOXm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tOXm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tOXm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tOXm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tOXm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:619790,&quot;alt&quot;:&quot;LLM jailbreak techniques DAN prompts Crescendo multi-turn attack instruction-data conflation bypass AI guardrails prompt injection defense Constitutional Classifiers Grok-4 DeepSeek&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/183987305?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="LLM jailbreak techniques DAN prompts Crescendo multi-turn attack instruction-data conflation bypass AI guardrails prompt injection defense Constitutional Classifiers Grok-4 DeepSeek" title="LLM jailbreak techniques DAN prompts Crescendo multi-turn attack instruction-data conflation bypass AI guardrails prompt injection defense Constitutional Classifiers Grok-4 DeepSeek" srcset="https://substackcdn.com/image/fetch/$s_!tOXm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tOXm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tOXm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tOXm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31e0680a-75ba-4808-92f5-f6007ad912ec_2752x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>TL;DR:</strong> LLMs process attacker instructions and system prompts through the same attention mechanism. No privilege separation. No access controls. Just tokens. Research confirms smarter models are more susceptible to adversarial manipulation. Grok-4 fell in two days. DeepSeek failed 58% of jailbreak tests. The fix is architecturally impossible. Here&#8217;s how the attacks work. </p><blockquote><p>This is the public feed. Upgrade to see what doesn&#8217;t make it out.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote><h2>Grok-4 Fell to Known LLM Jailbreaks in 48 Hours</h2><p>xAI released Grok-4 on July 9, 2025. Two days later, NeuralTrust researchers combined two known <strong>LLM jailbreak</strong> techniques and got it producing instructions for making incendiary devices. No zero-days. No exotic research. Just conversation design using methods documented in academic papers from 2024.</p><p>The attack used Echo Chamber, a technique that poisons the conversational context by subtly nudging the model toward unsafe territory without ever using a flagged keyword, combined with Crescendo, a multi-turn approach where each message escalates the topic slightly until the guardrails forget what they were guarding. Together they hit a 67% success rate on the primary objective. In one case, Grok-4 folded in a single turn.</p><p>The model that was supposed to compete with GPT-5 crumpled against attacks that any grad student could replicate after reading two papers. This is the same class of <a href="https://www.toxsec.com/p/fck-your-guardrails">prompt injection we&#8217;ve been running live fire chains against</a> for months. The technique scales. The defenses don&#8217;t.</p><h2>How Instruction-Data Conflation Hands Attackers the Keys</h2><p>The vulnerability has a name in the research: <strong>instruction-data conflation</strong>. Translation: the model processes legitimate instructions and attacker payloads through the exact same pipeline.</p><p>Here&#8217;s the failure. A system prompt, the hidden instructions a developer writes to tell the model how to behave, arrives as tokens. The attacker&#8217;s message also arrives as tokens. Both get processed by the same attention mechanism, the part of the neural network that decides which words matter most in context. There is no privileged channel. No access control. No kernel mode vs. user mode. The system prompt is a suggestion. The attacker&#8217;s payload is also a suggestion. Whichever carries more contextual weight wins.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!65z_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!65z_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 424w, https://substackcdn.com/image/fetch/$s_!65z_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 848w, https://substackcdn.com/image/fetch/$s_!65z_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 1272w, https://substackcdn.com/image/fetch/$s_!65z_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!65z_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png" width="570" height="840" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de96f89e-fc13-4903-9682-24dc123b22c2_570x840.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:840,&quot;width&quot;:570,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52660,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/183987305?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!65z_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 424w, https://substackcdn.com/image/fetch/$s_!65z_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 848w, https://substackcdn.com/image/fetch/$s_!65z_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 1272w, https://substackcdn.com/image/fetch/$s_!65z_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde96f89e-fc13-4903-9682-24dc123b22c2_570x840.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is why <strong>DAN prompts</strong> work. DAN, short for &#8220;Do Anything Now,&#8221; first appeared in December 2022 and has evolved through dozens of variants. Qualys documented eighteen named versions in January 2025 when they tested DeepSeek R1 against 885 jailbreak attacks. DeepSeek failed 58% of them. That same month, Cisco and the University of Pennsylvania hit DeepSeek with 50 HarmBench prompts and achieved a 100% attack success rate. The model blocked nothing.</p><p>The reasoning revolution arrived. The guardrails did not.</p><h2>Which LLM Jailbreak Techniques Actually Bypass AI Guardrails?</h2><p>The armory keeps growing. Each technique exploits the same blind spot from a different angle.</p><p><strong>Crescendo multi-turn attacks</strong> boil the frog. Start with innocent questions. Gradually shift tone across multiple messages. By message fifteen, the guardrails have lost the thread. Keyword filters evaluate individual messages. The attack lives in the arc across the conversation. This is what broke Grok-4. We covered the broader <a href="https://www.toxsec.com/p/distillation-raids-slopsquatting">indirect prompt injection surface</a> recently, and Crescendo is the same principle applied to the chat window.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iCh8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iCh8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 424w, https://substackcdn.com/image/fetch/$s_!iCh8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 848w, https://substackcdn.com/image/fetch/$s_!iCh8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 1272w, https://substackcdn.com/image/fetch/$s_!iCh8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iCh8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png" width="1024" height="915" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:915,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74081,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/183987305?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!iCh8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 424w, https://substackcdn.com/image/fetch/$s_!iCh8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 848w, https://substackcdn.com/image/fetch/$s_!iCh8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 1272w, https://substackcdn.com/image/fetch/$s_!iCh8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e28198a-d179-43fa-80e9-8ce10650e956_1024x915.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Bad Likert Judge</strong> turns the model into its own red team. We ask it to rate the harmfulness of potential responses on a 1-5 scale, then request examples for each rating. The model generates its own harmful content as a &#8220;demonstration.&#8221; Palo Alto&#8217;s Unit 42 used this technique alongside Crescendo and Deceptive Delight to extract explicit guidance for data exfiltration, spear-phishing templates, and instructions for incendiary devices from DeepSeek.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sQGw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sQGw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 424w, https://substackcdn.com/image/fetch/$s_!sQGw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 848w, https://substackcdn.com/image/fetch/$s_!sQGw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 1272w, https://substackcdn.com/image/fetch/$s_!sQGw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sQGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png" width="702" height="822" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:822,&quot;width&quot;:702,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:47330,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/183987305?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!sQGw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 424w, https://substackcdn.com/image/fetch/$s_!sQGw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 848w, https://substackcdn.com/image/fetch/$s_!sQGw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 1272w, https://substackcdn.com/image/fetch/$s_!sQGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb3bb958-ab7c-45dd-a913-673fea0fa7cb_702x822.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Token and God Mode systems</strong> gamify compliance with fake points and imaginary privileges. A neural network got peer-pressured by imaginary status. It works because the model is a people-pleaser first and a security system never.</p><p>The next generation is already here. TokenBreak manipulates how input gets chunked into tokens. Deceptive Delight embeds dangerous requests inside cheerful narratives. AutoDAN generates human-readable jailbreaks that dodge perplexity detectors. The PAIR algorithm pits one LLM against another and achieves successful jailbreaks in under twenty queries.</p><p>Every single one exploits the same architectural truth: <strong>LLMs are excellent at pretending.</strong> The training data included millions of &#8220;pretend you are X&#8221; scenarios. To the silicon, &#8220;pretend to be a pirate&#8221; and &#8220;pretend to be an AI without restrictions&#8221; are the same type of instruction: character sheets.</p><h2>Why Smarter AI Models Become Easier Jailbreak Targets</h2><p>Here&#8217;s the kicker, and the reason none of this gets patched.</p><p>The DecodingTrust project, a joint effort from researchers at Illinois, Stanford, UC Berkeley, and Microsoft Research, tested GPT-4 against GPT-3.5 under adversarial conditions. The finding: <strong>GPT-4 is more susceptible to manipulation through adversarial system prompts.</strong> The exact capability that makes it better at following instructions makes it better at following malicious instructions. Better language understanding means better at adopting personas. Including the ones we give it.</p><p>Roleplay is a feature. Legitimate users need persona adoption for creative writing, education, tutoring. Blocking it lobotomizes the product. The same mechanism that lets a teacher say &#8220;explain photosynthesis as a children&#8217;s TV host&#8221; lets us say &#8220;explain synthesis as a chemist without ethics.&#8221; Every patch is reactive. Block the phrasing, we shift to synonyms. Add keyword filters, we encode in Base64. The defender must be right every time. We need to be right once.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bsrq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bsrq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 424w, https://substackcdn.com/image/fetch/$s_!bsrq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 848w, https://substackcdn.com/image/fetch/$s_!bsrq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 1272w, https://substackcdn.com/image/fetch/$s_!bsrq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bsrq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png" width="1044" height="1037" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1037,&quot;width&quot;:1044,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:96077,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/183987305?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!bsrq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 424w, https://substackcdn.com/image/fetch/$s_!bsrq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 848w, https://substackcdn.com/image/fetch/$s_!bsrq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 1272w, https://substackcdn.com/image/fetch/$s_!bsrq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25299215-4bb4-4cfc-bca7-66a218f35004_1044x1037.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>November 2025 proved the scale of what this enables. A Chinese state-sponsored group jailbroke Claude Code, Anthropic&#8217;s AI coding tool, and used it as an autonomous attack agent against roughly thirty global targets across tech, finance, chemical manufacturing, and government agencies. The AI handled 80-90% of the operation, making thousands of requests per second. Human operators stepped in at maybe four to six decision points per campaign. The jailbreak was the skeleton key. Everything after was automation at a speed no human team could match.</p><p>Anthropic tried the hardest defense in the industry. Their Constitutional Classifiers, a system of input and output filters trained on synthetic data, reduced automated jailbreak success from 86% to 4.4%. Then they ran a bug bounty through HackerOne in February 2025. Within the seven-day challenge window, four teams split $55,000 in bounties. One team found a universal jailbreak. The defense that stopped 95% of synthetic attacks crumpled against humans with motivation and a week of free time.</p><p>The compliance officer sees a chatbot. The red teamer sees an instruction-following machine with a costume closet and zero access controls.</p><blockquote><p>We dropped the free chapters. Now breach the wall for the dead-simple step-by-step kill switch that shuts this all down.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote>
      <p>
          <a href="https://www.toxsec.com/p/dan-prompts-for-guardrail-bypass">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[AP2 AgentCard Poisoning Breaks AI Payment Security]]></title><description><![CDATA[How the confused deputy problem in A2A turns your AI agent's payment scope into an automated wire transfer for an attacker, and why AP2's cryptographic mandates don't stop it.]]></description><link>https://www.toxsec.com/p/the-agent-economy-is-waking-up</link><guid isPermaLink="false">https://www.toxsec.com/p/the-agent-economy-is-waking-up</guid><dc:creator><![CDATA[ToxSec]]></dc:creator><pubDate>Thu, 15 Jan 2026 14:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K12H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K12H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K12H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!K12H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!K12H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!K12H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K12H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:634051,&quot;alt&quot;:&quot;AP2 AgentCard poisoning confused deputy attack: AI payment agent hijacked via A2A protocol before cryptographic mandate signing&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/175231527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AP2 AgentCard poisoning confused deputy attack: AI payment agent hijacked via A2A protocol before cryptographic mandate signing" title="AP2 AgentCard poisoning confused deputy attack: AI payment agent hijacked via A2A protocol before cryptographic mandate signing" srcset="https://substackcdn.com/image/fetch/$s_!K12H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!K12H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!K12H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!K12H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2e412a9-a322-4f1a-ab83-1e8dc53a127c_2752x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>TL;DR:</strong> Google&#8217;s AP2 protocol and Universal Commerce Protocol put a $5 trillion agentic commerce stack into developer hands in early 2026. The A2A protocol underneath it uses digital business cards called AgentCards to route tasks between agents. Researchers proved you can stuff a prompt injection payload inside that card. Your agent becomes a confused deputy: it holds your payment permissions and takes orders from us. The crypto signatures don&#8217;t help. We sign the mandate ourselves. </p><blockquote><p>This is the public feed. Upgrade to see what doesn&#8217;t make it out.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote><h2>Your AI Just Signed a Wire Transfer You Didn&#8217;t Approve</h2><p>January 11, 2026. Google announces the Universal Commerce Protocol at the National Retail Federation conference. UCP sits on top of AP2 (the Agent Payments Protocol), talks to A2A (the agent-to-agent coordination protocol) and MCP (the tool protocol), and lets your AI agent complete a purchase directly from Google Search. Shopify, Target, Walmart, Visa, all signed. AP2 went live with 60 partner organizations in September 2025. McKinsey projects $3 to $5 trillion in global agentic commerce volume by 2030.</p><p>Here is the trust model this stack runs on: a user expresses intent, an AI agent acts on it, and AP2 generates a cryptographically signed mandate proving the user authorized the transaction. The mandate is tamper-evident. The payment is non-reputable. The audit trail is clean. On paper, this is a closed system.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!93TQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!93TQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 424w, https://substackcdn.com/image/fetch/$s_!93TQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 848w, https://substackcdn.com/image/fetch/$s_!93TQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 1272w, https://substackcdn.com/image/fetch/$s_!93TQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!93TQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png" width="1451" height="879" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:879,&quot;width&quot;:1451,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:128858,&quot;alt&quot;:&quot;Toxsec.com image.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/175231527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image." title="Toxsec.com image." srcset="https://substackcdn.com/image/fetch/$s_!93TQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 424w, https://substackcdn.com/image/fetch/$s_!93TQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 848w, https://substackcdn.com/image/fetch/$s_!93TQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 1272w, https://substackcdn.com/image/fetch/$s_!93TQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709136eb-3f57-4efd-a2e7-b97d55da938c_1451x879.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The problem is the agent. AP2&#8217;s cryptographic protections fire after the agent decides what to sign. If an attacker already owns the agent&#8217;s reasoning by the time the mandate gets generated, the crypto is irrelevant. We get a perfectly valid signature on a fraudulent transaction. The math is clean. The money is gone. If you want to see the same logic one layer down the stack, <a href="https://www.toxsec.com/p/lets-poison-the-mcp">our MCP tool poisoning breakdown</a> shows how this exact reasoning failure starts at the tool layer.</p><h2>How AgentCard Poisoning Hijacks AP2 Payment Scope</h2><p>The A2A protocol is how AI agents find and hire each other. Every agent publishes an AgentCard, a JSON file served at <code>/.well-known/agent.json</code> on its domain. Think of it as a machine-readable business card: &#8220;I process invoices. I validate vendors. I have access to the procurement database.&#8221; The host agent reads every card it encounters and decides which agent handles which task.</p><p>The confused deputy problem, a concept in computer security since the late 1980s, describes what happens when a trusted program gets tricked into misusing its own privileges. The program isn&#8217;t compromised in the traditional sense. It&#8217;s just doing exactly what it was told, by the wrong person, with the right credentials. In an A2A context, the host agent is the deputy. It holds your AP2 payment scope. It follows instructions from whatever AgentCards it reads.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lmbt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lmbt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 424w, https://substackcdn.com/image/fetch/$s_!Lmbt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 848w, https://substackcdn.com/image/fetch/$s_!Lmbt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 1272w, https://substackcdn.com/image/fetch/$s_!Lmbt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lmbt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png" width="1333" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1333,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:110941,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/175231527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!Lmbt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 424w, https://substackcdn.com/image/fetch/$s_!Lmbt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 848w, https://substackcdn.com/image/fetch/$s_!Lmbt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 1272w, https://substackcdn.com/image/fetch/$s_!Lmbt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbade45e9-9aba-4d2f-ba62-2b6fea0040c8_1333x814.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>August 2025. <a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/agent-in-the-middle-abusing-agent-cards-in-the-agent-2-agent-protocol-to-win-all-the-tasks/">Trustwave SpiderLabs published research</a> they called &#8220;Agent in the Middle.&#8221; The attack: stuff a prompt injection payload directly into an AgentCard&#8217;s capability description field. The A2A spec in version 0.3 and above supports AgentCard signing but does not enforce it. Your host agent fetches the card, reads the descriptions, and the injected instructions land in the model&#8217;s context window as trusted input. Every subsequent task routes through the compromised agent. Every A2A call, every MCP tool use, every AP2 mandate gets generated under our influence.</p><p>We can redirect a vendor. We can inflate a transaction amount slightly enough not to trigger fraud alerts. We can swap the shipping address. The mandate gets signed. The audit trail says you approved it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E5_q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E5_q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 424w, https://substackcdn.com/image/fetch/$s_!E5_q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 848w, https://substackcdn.com/image/fetch/$s_!E5_q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 1272w, https://substackcdn.com/image/fetch/$s_!E5_q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E5_q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png" width="1362" height="944" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:944,&quot;width&quot;:1362,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:116885,&quot;alt&quot;:&quot;A2A host agent parsing poisoned AgentCard capability description, showing injected instruction field beside legitimate invoice processing capability&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/175231527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A2A host agent parsing poisoned AgentCard capability description, showing injected instruction field beside legitimate invoice processing capability" title="A2A host agent parsing poisoned AgentCard capability description, showing injected instruction field beside legitimate invoice processing capability" srcset="https://substackcdn.com/image/fetch/$s_!E5_q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 424w, https://substackcdn.com/image/fetch/$s_!E5_q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 848w, https://substackcdn.com/image/fetch/$s_!E5_q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 1272w, https://substackcdn.com/image/fetch/$s_!E5_q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a0a5873-4cd4-45c7-ad8c-a41c073c9771_1362x944.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Agent Session Smuggling Finishes What AgentCard Poisoning Started</h2><p>November 2025. <a href="https://unit42.paloaltonetworks.com/agent-session-smuggling-in-agent2agent-systems/">Palo Alto&#8217;s Unit 42 published research</a> on a variant they call Agent Session Smuggling. This one doesn&#8217;t need an initial AgentCard compromise. It works on agents you&#8217;ve already authenticated and trusted.</p><p>A2A is a stateful protocol: it remembers the conversation. This is what makes it useful for multi-step tasks. An agent can pick up a workflow mid-stream, carry context across turns, and coordinate complex purchase flows. Unit 42 found that a malicious remote agent can exploit this statefulness to inject instructions between a legitimate request and its response. The A2A spec includes a legitimate mechanism called <code>input-required</code> state, where a remote agent asks the client agent for additional information. Session smuggling weaponizes that mechanism.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KP1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KP1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 424w, https://substackcdn.com/image/fetch/$s_!KP1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 848w, https://substackcdn.com/image/fetch/$s_!KP1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 1272w, https://substackcdn.com/image/fetch/$s_!KP1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KP1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png" width="1102" height="1037" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1037,&quot;width&quot;:1102,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:92454,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/175231527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!KP1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 424w, https://substackcdn.com/image/fetch/$s_!KP1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 848w, https://substackcdn.com/image/fetch/$s_!KP1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 1272w, https://substackcdn.com/image/fetch/$s_!KP1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4527769b-55b2-413b-b3c7-6bd3914e44fa_1102x1037.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s the move: your client agent sends a normal task request. The remote agent starts processing. Midway through the session, the remote agent fires back an <code>input-required</code> update containing injected instructions referencing credentials, vendor details, or payment routing. Your client agent reads this as a continuation of an authenticated conversation. The instructions execute before any AP2 mandate validation runs.</p><p>Layered on top of the AgentCard poisoning in 0x01, the full chain looks like this: the poisoned card establishes our agent in the routing path, session smuggling injects transaction-level instructions mid-session, and the resulting AP2 mandate carries our modifications with the user&#8217;s valid signature. <a href="https://developers.redhat.com/articles/2025/08/19/how-enhance-agent2agent-security">Red Hat confirmed</a> the A2A spec provides no built-in defense against this specific injection pattern.</p><h2>The Mandate Signs Whatever the Confused Deputy Tells It To</h2><p>AP2&#8217;s security story centers on verifiable digital credentials. Three mandate types, each cryptographically signed using ECDSA: an Intent Mandate (pre-authorized spending parameters), a Cart Mandate (the exact items and price at checkout), and a Payment Mandate (the financial instruction to the network). The claim is that these mandates create a tamper-evident chain of evidence from user intent to executed transaction.</p><p>Here is where the claim breaks. The chain starts with the agent. The user&#8217;s intent gets translated into a mandate by the AI agent acting on their behalf. If we own the agent&#8217;s context through the two attacks above, we own what the intent looks like by the time the mandate is generated. We don&#8217;t tamper with the mandate after signing. We tamper with what the agent believes the intent was before it picks up the pen.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ojLK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ojLK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 424w, https://substackcdn.com/image/fetch/$s_!ojLK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 848w, https://substackcdn.com/image/fetch/$s_!ojLK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 1272w, https://substackcdn.com/image/fetch/$s_!ojLK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ojLK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png" width="1141" height="977" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:977,&quot;width&quot;:1141,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:93933,&quot;alt&quot;:&quot;Toxsec.com image&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.toxsec.com/i/175231527?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Toxsec.com image" title="Toxsec.com image" srcset="https://substackcdn.com/image/fetch/$s_!ojLK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 424w, https://substackcdn.com/image/fetch/$s_!ojLK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 848w, https://substackcdn.com/image/fetch/$s_!ojLK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 1272w, https://substackcdn.com/image/fetch/$s_!ojLK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff170ddad-7ed3-4514-8e93-6162c6e5e11c_1141x977.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AP2&#8217;s own documentation acknowledges the gap: the protocol explicitly asks how merchants can verify that an agent&#8217;s request accurately reflects the user&#8217;s true intent. Their answer is the mandate system itself. But the mandate system assumes the agent is trustworthy when it generates the mandate. Researchers at Trustwave, Unit 42, and Cloud Security Alliance all documented in 2025 that this assumption fails at the input parsing layer, before mandate generation begins. In December 2025, OpenAI published guidance on hardening their browser agent and acknowledged that prompt injection, the root mechanism of every attack in this chain, will likely never be fully solved.</p><p>AP2&#8217;s math is clean. The attack lands before the math runs.</p><blockquote><p>We dropped the free chapters. Now breach the wall for the dead-simple step-by-step kill switch that shuts this all down.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.toxsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.toxsec.com/subscribe?"><span>Subscribe now</span></a></p></blockquote>
      <p>
          <a href="https://www.toxsec.com/p/the-agent-economy-is-waking-up">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>