Normal view
-
/r/netsec - Information Security News & Discussion
- Common Entra ID Security Assessment Findings β Part 2: Privileged Unprotected Groups
-
/r/netsec - Information Security News & Discussion
- Introducing the Rootkit Techniques Matrix and updates to the Guide
-
/r/netsec - Information Security News & Discussion
- Your Agent Runs Code You Never Wrote - Why agent isolation is a different problem
Your Agent Runs Code You Never Wrote - Why agent isolation is a different problem
I looked at how Cursor, Claude Code, Devin, OpenAI, and E2B actually isolate agent workloads today. The range goes from literally no sandbox (Cursor runs commands in your shell) to hardware-isolated Firecracker microVMs (E2B).
Container runtimes have had escape CVEs every year since 2019. Firecracker: zero guest-to-host escapes in seven years. AWS themselves said "we do not consider containers a security boundary."
The post covers five assumptions traditional isolation makes that agents break, real incidents (Devin taken over via one poisoned GitHub issue, Slack AI exfiltration, Clinejection supply chain attack), and the six dimensions of isolation I'll be exploring in this series.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Axios npm package compromised in supply chain attack. Downloads malware dropper package
Axios npm package compromised in supply chain attack. Downloads malware dropper package
Axios is one of the most used npm packages which just got hit by a supply chain attack. Malicious versions of Axios (1.14.1 and 0.30.4) hit the npm registry yesterday. They carry a malware dropper called plain-crypto-js@4.2.1. If you ran npm install in the last 24 hours, check your lockfile. Roll back to 1.14.0 and rotate every credential that was in your environment. Currently, as of now, npmjs has removed the compromised versions of axios package along with the malicious plain crypto js package. Live updates + info linked.
[link] [comments]