Breaking 07:45 Syrian president thanks Trump for “Precious” perfume gift 07:37 Sea level rise has nearly doubled since 1960, study finds 07:30 Eswatini faces criticism over acceptance of U.S. deportees 07:16 Webb telescope suggests Neptune moon Nereid formed within planet’s system 07:02 Nvidia concedes Chinese AI chip market as Huawei gains dominance 16:30 Amazon.com wins appeal in tariff evasion case 16:20 Three supertankers move six million barrels through Hormuz 16:15 James Murdoch expands media footprint with Vox Media acquisitions 16:01 U.S and Israel planned postwar iran leadership shift with ahmadinejad 15:30 Southwest Airlines plans major expansion of India innovation hub to 1,000 employees 14:30 Marco Rubio calls for a “New Path” for Cuba amid rising tensions with Havana 14:15 Elon Musk could become the first trillionaire following SpaceX stock market debut 14:00 Intuit announces major workforce reduction to strengthen AI strategy 13:06 GitHub internal repositories breached through malicious VS Code extension 12:00 Lowe’s maintains annual forecast despite weak U.S. housing demand 11:50 Alibaba launches powerful AI chip to challenge Nvidia dominance in China 11:45 AI financing drives record surge in U.S. convertible bond issuance 09:56 Qatar says Strait of Hormuz remains closed to normal shipping traffic 09:30 Bulgaria requests US visa-free travel for its citizens, says prime minister 09:15 Hyundai recalls over 54,000 vehicles in the US due to fire risk 09:00 Google unveils new connected glasses featuring AI assistant Gemini 08:19 Oil market faces panic risk if Hormuz closure extends into June 08:15 China defends rare earth export controls and signals cooperation with the United States

Researchers hijack ai agents via github prompt injection attacks

Thursday 16 April 2026 - 09:20
By: Dakir Madiha
Researchers hijack ai agents via github prompt injection attacks

Security researchers have demonstrated how artificial intelligence agents from Anthropic, Google and Microsoft can be compromised through prompt injection attacks hidden in GitHub workflows. The technique allowed attackers to extract API keys, GitHub tokens and other sensitive data without direct system access, raising concerns about the security of AI driven development tools.

The research was conducted at Johns Hopkins University, where Aonan Guan and colleagues identified a vulnerability in AI agents integrated into software development pipelines. These agents analyze pull requests and issues on GitHub. By embedding malicious instructions in pull request titles or issue comments, attackers could manipulate the agents into revealing confidential information during automated reviews.

The attack relies on how these systems process context. AI agents treat user generated text such as titles, comments and issue descriptions as trusted input. Guan showed that carefully crafted prompts can override built in safeguards. In one case, the Claude based security review tool processed a malicious title and exposed sensitive credentials in its automated response. The researcher described the method as “comment and control,” since the full attack cycle occurs داخل GitHub without external infrastructure.

The same approach proved effective against multiple systems. Google’s Gemini CLI agent was tricked into exposing its API key by disguising malicious instructions as trusted content. Microsoft’s GitHub Copilot agent was manipulated using hidden HTML comments embedded in Markdown, invisible to users but readable by the AI system. This method bypassed multiple layers of runtime protection.

Despite the severity, responses from the affected companies remained limited. Anthropic issued a small bug bounty and added a documentation warning. Google and Microsoft also paid rewards through their vulnerability programs. None of the companies released formal security advisories or assigned CVE identifiers, leaving many users unaware of potential exposure, especially those running outdated versions.

The findings highlight broader structural risks in AI agent ecosystems. A separate analysis by OX Security identified a critical flaw in Anthropic’s Model Context Protocol, which connects AI agents to external tools. The vulnerability could enable arbitrary command execution on affected servers, impacting widely used software components.

These incidents build on earlier research by Aikido Security, which showed that prompt injection attacks can compromise AI systems embedded in CI CD pipelines. This class of vulnerabilities, sometimes referred to as “PromptPwnd,” demonstrates that AI agents can be manipulated in ways similar to phishing attacks, but targeting machines instead of users.


  • Fajr
  • Sunrise
  • Dhuhr
  • Asr
  • Maghrib
  • Isha

This website, walaw.press, uses cookies to provide you with a good browsing experience and to continuously improve our services. By continuing to browse this site, you agree to the use of these cookies.