• bitcoinBitcoin(BTC)$78,319.001.75%
  • ethereumEthereum(ETH)$2,305.351.39%
  • tetherTether(USDT)$1.000.02%
  • rippleXRP(XRP)$1.390.94%
  • binancecoinBNB(BNB)$615.92-0.09%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$83.79-0.10%
  • tronTRON(TRX)$0.3287860.76%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.030.14%
  • dogecoinDogecoin(DOGE)$0.108053-0.10%
  • whitebitWhiteBIT Coin(WBT)$58.451.27%
  • USDSUSDS(USDS)$1.000.01%
  • HyperliquidHyperliquid(HYPE)$41.544.11%
  • leo-tokenLEO Token(LEO)$10.330.13%
  • cardanoCardano(ADA)$0.247706-0.34%
  • bitcoin-cashBitcoin Cash(BCH)$449.411.46%
  • moneroMonero(XMR)$387.381.45%
  • chainlinkChainlink(LINK)$9.09-0.51%
  • zcashZcash(ZEC)$378.098.30%
  • CantonCanton(CC)$0.1514080.35%
  • stellarStellar(XLM)$0.1595200.39%
  • USD1USD1(USD1)$1.00-0.01%
  • daiDai(DAI)$1.000.06%
  • litecoinLitecoin(LTC)$55.450.41%
  • avalanche-2Avalanche(AVAX)$9.100.12%
  • Ethena USDeEthena USDe(USDE)$1.000.01%
  • hedera-hashgraphHedera(HBAR)$0.0878970.23%
  • RainRain(RAIN)$0.007808-0.45%
  • shiba-inuShiba Inu(SHIB)$0.000006-1.45%
  • suiSui(SUI)$0.920.69%
  • MemeCoreMemeCore(M)$2.83-10.34%
  • the-open-networkToncoin(TON)$1.32-1.27%
  • paypal-usdPayPal USD(PYUSD)$1.00-0.01%
  • crypto-com-chainCronos(CRO)$0.0683760.21%
  • Circle USYCCircle USYC(USYC)$1.120.00%
  • tether-goldTether Gold(XAUT)$4,599.930.41%
  • BittensorBittensor(TAO)$276.768.38%
  • Global DollarGlobal Dollar(USDG)$1.000.02%
  • BlackRock USD Institutional Digital Liquidity FundBlackRock USD Institutional Digital Liquidity Fund(BUIDL)$1.000.00%
  • pax-goldPAX Gold(PAXG)$4,602.820.48%
  • mantleMantle(MNT)$0.630.06%
  • uniswapUniswap(UNI)$3.210.12%
  • polkadotPolkadot(DOT)$1.200.06%
  • SkySky(SKY)$0.0813320.81%
  • Pi NetworkPi Network(PI)$0.179157-0.34%
  • Falcon USDFalcon USD(USDF)$1.000.01%
  • okbOKB(OKB)$83.460.64%
  • World Liberty FinancialWorld Liberty Financial(WLFI)$0.054820-9.34%
  • AsterAster(ASTER)$0.660.30%
  • nearNEAR Protocol(NEAR)$1.29-0.34%
TradePoint.io
  • Main
  • AI & Technology
  • Stock Charts
  • Market & News
  • Business
  • Finance Tips
  • Trade Tube
  • Blog
  • Shop
No Result
View All Result
TradePoint.io
No Result
View All Result

Claude Code, Copilot and Codex all got hacked. Every attacker went for the credential, not the model.

April 30, 2026
in AI & Technology
Reading Time: 7 mins read
A A
Claude Code, Copilot and Codex all got hacked. Every attacker went for the credential, not the model.
ShareShareShareShareShare

On March 30, BeyondTrust proved that a crafted GitHub branch name could steal Codex’s OAuth token in cleartext. OpenAI classified it Critical P1. Two days later, Anthropic’s Claude Code source code spilled onto the public npm registry, and within hours, Adversa found Claude Code silently ignored its own deny rules once a command exceeded 50 subcommands. These were not isolated bugs. They were the latest in a nine-month run: six research teams disclosed exploits against Codex, Claude Code, Copilot, and Vertex AI, and every exploit followed the same pattern. An AI coding agent held a credential, executed an action, and authenticated to a production system without a human session anchoring the request.

YOU MAY ALSO LIKE

A New NVIDIA Research Shows Speculative Decoding in NeMo RL Achieves 1.8× Rollout Generation Speedup at 8B and Projects 2.5× End-to-End Speedup at 235B

A Coding Implementation of End-to-End Brain Decoding from MEG Signals Using NeuralSet and Deep Learning for Predicting Linguistic Features

The attack surface was first demonstrated at Black Hat USA 2025, when Zenity CTO Michael Bargury hijacked ChatGPT, Microsoft Copilot Studio, Google Gemini, Salesforce Einstein and Cursor with Jira MCP on stage with zero clicks. Nine months later, those credentials are what attackers reached.

Merritt Baer, CSO at Enkrypt AI and former Deputy CISO at AWS, named the failure in an exclusive VentureBeat interview. “Enterprises believe they’ve ‘approved’ AI vendors, but what they’ve actually approved is an interface, not the underlying system.” The credentials underneath the interface are the breach.

Codex, where a branch name stole GitHub tokens

BeyondTrust researcher Tyler Jespersen, with Fletcher Davis and Simon Stewart, found Codex cloned repositories using a GitHub OAuth token embedded in the git remote URL. During cloning, the branch name parameter flowed unsanitized into the setup script. A semicolon and a backtick subshell turned the branch name into an exfiltration payload.

Stewart added the stealth. By appending 94 Ideographic Space characters (Unicode U+3000) after “main,” the malicious branch looked identical to the standard main branch in the Codex web portal. A developer sees “main.” The shell sees curl exfiltrating their token. OpenAI classified it Critical P1 and shipped full remediation by February 5, 2026.

Claude Code, where two CVEs and a 50-subcommand bypass broke the sandbox

CVE-2026-25723 hit Claude Code’s file-write restrictions. Piped sed and echo commands escaped the project sandbox because command chaining was not validated. Patched in 2.0.55. CVE-2026-33068 was subtler. Claude Code resolved permission modes from .claude/settings.json before showing the workspace trust dialog. A malicious repo set permissions.defaultMode to bypassPermissions. The trust prompt never appeared. Patched in 2.1.53.

The 50-subcommand bypass landed last. Adversa found that Claude Code silently dropped deny-rule enforcement once a command exceeded 50 subcommands. Anthropic’s engineers had traded security for speed and stopped checking after the fiftieth. Patched in 2.1.90.

“A significant vulnerability in enterprise AI is broken access control, where the flat authorization plane of an LLM fails to respect user permissions,” wrote Carter Rees, VP of AI and Machine Learning at Reputation and a member of the Utah AI Commission. The repository decided what permissions the agent had. The token budget decided which deny rules survived.

Copilot, where a pull request description and a GitHub issue both became root

Johann Rehberger demonstrated CVE-2025-53773 against GitHub Copilot with Markus Vervier of Persistent Security as co-discoverer. Hidden instructions in PR descriptions triggered Copilot to flip auto-approve mode in .vscode/settings.json. That disabled all confirmations and granted unrestricted shell execution across Windows, macOS, and Linux. Microsoft patched it in the August 2025 Patch Tuesday release.

Then, Orca Security cracked Copilot inside GitHub Codespaces. Hidden instructions in a GitHub issue manipulated Copilot into checking out a malicious PR with a symbolic link to /workspaces/.codespaces/shared/user-secrets-envs.json. A crafted JSON $schema URL exfiltrated the privileged GITHUB_TOKEN. Full repository takeover. Zero user interaction beyond opening the issue.

Mike Riemer, CTO at Ivanti, framed the speed dimension in a VentureBeat interview: “Threat actors are reverse engineering patches within 72 hours. If a customer doesn’t patch within 72 hours of release, they’re open to exploit.” Agents compress that window to seconds.

Vertex AI, where default scopes reached Gmail, Drive and Google’s own supply chain

Unit 42 researcher Ofir Shaty found that the default Google service identity attached to every Vertex AI agent had excessive permissions. Stolen P4SA credentials granted unrestricted read access to every Cloud Storage bucket in the project and reached restricted, Google-owned Artifact Registry repositories at the core of the Vertex AI Reasoning Engine. Shaty described the compromised P4SA as functioning like a “double agent,” with access to both user data and Google’s own infrastructure.

VentureBeat defense grid

Security requirement

Defense shipped

Exploit path

The gap

Sandbox AI agent execution

Codex runs tasks in cloud containers; token scrubbed during agent runtime.

Token present during cloning. Branch-name command injection executed before cleanup.

No input sanitization on container setup parameters.

Restrict file system access

Claude Code sandboxes writes via accept-edits mode.

Piped sed/echo escaped sandbox (CVE-2026-25723). Settings.json bypassed trust dialog (CVE-2026-33068). 50-subcommand chain dropped deny-rule enforcement.

Command chaining not validated. Settings loaded before trust. Deny rules truncated for performance.

Block prompt injection in code context

Copilot filters PR descriptions for known injection patterns.

Hidden injections in PRs, README files, and GitHub issues triggered RCE (CVE-2025-53773 + Orca RoguePilot).

Static pattern matching loses to embedded prompts in legitimate review and Codespaces flows.

Scope agent credentials to least privilege

Vertex AI Agent Engine uses P4SA service agent with OAuth scopes.

Default scopes reached Gmail, Calendar, Drive. P4SA credentials read every Cloud Storage bucket and Google’s Artifact Registry.

OAuth scopes non-editable by default. Least privilege violated by design.

Inventory and govern agent identities

No major AI coding agent vendor ships agent identity discovery or lifecycle management.

Not attempted. Enterprises do not inventory AI coding agents, their credentials, or their permission scopes.

AI coding agents are invisible to IAM, CMDB, and asset inventory. Zero governance exists.

Detect credential exfiltration from agent runtime

Codex obscures tokens in web portal view. Claude Code logs subcommands.

Tokens visible in cleartext inside containers. Unicode obfuscation hid exfil payloads. Subcommand chaining hid intent.

No runtime monitoring of agent network calls. Log truncation hid the bypass.

Audit AI-generated code for security flaws

Anthropic launched Claude Code Security (Feb 2026). OpenAI launched Codex Security (March 2026).

Both scan generated code. Neither scans the agent’s own execution environment or credential handling.

Code-output security is not agent-runtime security. The agent itself is the attack surface.

Every exploit targeted runtime credentials, not model output

Every vendor shipped a defense. Every defense was bypassed.

The Sonar 2026 State of Code Developer Survey found 25% of developers use AI agents regularly, and 64% have started using them. Veracode tested more than 100 LLMs and found 45% of generated code samples introduced OWASP Top 10 flaws, a separate failure that compounds the runtime credential gap.

CrowdStrike CTO Elia Zaitsev framed the rule in an exclusive VentureBeat interview at RSAC 2026: collapse agent identities back to the human, because an agent acting on your behalf should never have more privileges than you do. Codex held a GitHub OAuth token scoped to every repository the developer authorized. Vertex AI’s P4SA read every Cloud Storage bucket in the project. Claude Code traded deny-rule enforcement for token budget.

Kayne McGladrey, an IEEE Senior Member who advises enterprises on identity risk, made the same diagnosis in an exclusive interview with VentureBeat. “It uses far more permissions than it should have, more than a human would, because of the speed of scale and intent.”

Riemer drew the operational line in an exclusive VentureBeat interview. “It becomes, I don’t know you until I validate you.” The branch name talked to the shell before validation. The GitHub issue talked to Copilot before anyone read it.

Security director action plan

  1. Inventory every AI coding agent (CIEM). Codex, Claude Code, Copilot, Cursor, Gemini Code Assist, Windsurf. List the credentials and OAuth scopes each received at setup. If your CMDB has no category for AI agent identities, create one.

  2. Audit OAuth scopes and patch levels. Upgrade Claude Code to 2.1.90 or later. Verify Copilot’s August 2025 patch. Migrate Vertex AI to the bring-your-own-service-account model.

  3. Treat branch names, pull request descriptions, GitHub issues, and repo configuration as untrusted input. Monitor for Unicode obfuscation (U+3000), command chaining over 50 subcommands, and changes to .vscode/settings.json or .claude/settings.json that flip permission modes.

  4. Govern agent identities the way you govern human privileged identities (PAM/IGA). Credential rotation. Least-privilege scoping. Separation of duties between the agent that writes code and the agent that deploys it. CyberArk, Delinea, and any PAM platform that accepts non-human identities can onboard agent OAuth credentials today; Gravitee’s 2026 survey found only 21.9% of teams have done it.

  5. Validate before you communicate. “As long as we trust and we check and we validate, I’m fine with letting AI maintain it,” Riemer said. Before any AI coding agent authenticates to GitHub, Gmail, or an internal repository, verify the agent’s identity, scope, and the human session it is bound to.

  6. Ask each vendor in writing before your next renewal. “Show me the identity lifecycle management controls for the AI agent running in my environment, including credential scope, rotation policy, and permission audit trail.” If the vendor cannot answer, that is the audit finding.

The governance gap in three sentences

Most CISOs inventory every human identity and have zero inventory of the AI agents running with equivalent credentials. No IAM framework governs human privilege escalation and agent privilege escalation with the same rigor. Most scanners track every CVE but cannot alert when a branch name exfiltrates a GitHub token through a container that developers trust by default.

Zaitsev’s advice to RSAC 2026 attendees was blunt: you already know what to do. Agents just made the cost of not doing it catastrophic.

Credit: Source link

ShareTweetSendSharePin

Related Posts

A New NVIDIA Research Shows Speculative Decoding in NeMo RL Achieves 1.8× Rollout Generation Speedup at 8B and Projects 2.5× End-to-End Speedup at 235B
AI & Technology

A New NVIDIA Research Shows Speculative Decoding in NeMo RL Achieves 1.8× Rollout Generation Speedup at 8B and Projects 2.5× End-to-End Speedup at 235B

May 2, 2026
A Coding Implementation of End-to-End Brain Decoding from MEG Signals Using NeuralSet and Deep Learning for Predicting Linguistic Features
AI & Technology

A Coding Implementation of End-to-End Brain Decoding from MEG Signals Using NeuralSet and Deep Learning for Predicting Linguistic Features

May 1, 2026
Salesforce launches Agentforce Operations to fix the workflows breaking enterprise AI
AI & Technology

Salesforce launches Agentforce Operations to fix the workflows breaking enterprise AI

May 1, 2026
AI Performances And Screenplays Won’t Be Eligible For Oscars
AI & Technology

AI Performances And Screenplays Won’t Be Eligible For Oscars

May 1, 2026
Next Post
Why OpenAI’s ‘goblin’ problem matters — and how you can release the goblins on your own

Why OpenAI's 'goblin' problem matters — and how you can release the goblins on your own

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

No Result
View All Result
‘Braille bites’: Arkansas teen creates restaurant menus for visually impaired

‘Braille bites’: Arkansas teen creates restaurant menus for visually impaired

April 29, 2026
Sen. Cassidy says vote to convict Trump in impeachment trial ‘might be’ a liability in primary

Sen. Cassidy says vote to convict Trump in impeachment trial ‘might be’ a liability in primary

April 30, 2026
Vice President Vance leads high-stakes peace talks between U.S. & Iran

Vice President Vance leads high-stakes peace talks between U.S. & Iran

April 26, 2026

About

Learn more

Our Services

Legal

Privacy Policy

Terms of Use

Bloggers

Learn more

Article Links

Contact

Advertise

Ask us anything

©2020- TradePoint.io - All rights reserved!

Tradepoint.io, being just a publishing and technology platform, is not a registered broker-dealer or investment adviser. So we do not provide investment advice. Rather, brokerage services are provided to clients of Tradepoint.io by independent SEC-registered broker-dealers and members of FINRA/SIPC. Every form of investing carries some risk and past performance is not a guarantee of future results. “Tradepoint.io“, “Instant Investing” and “My Trading Tools” are registered trademarks of Apperbuild, LLC.

This website is operated by Apperbuild, LLC. We have no link to any brokerage firm and we do not provide investment advice. Every information and resource we provide is solely for the education of our readers. © 2020 Apperbuild, LLC. All rights reserved.

No Result
View All Result
  • Main
  • AI & Technology
  • Stock Charts
  • Market & News
  • Business
  • Finance Tips
  • Trade Tube
  • Blog
  • Shop

© 2023 - TradePoint.io - All Rights Reserved!