They have kidnapped agents from Anthropic, Google and Microsoft for the sake of science. The three companies ended up paying

In some development teams it is already becoming common to rely on artificial intelligence agents to review incidents, analyze code changes and move through tasks that were previously left in human hands. The problem appears when these systems not only read information that may come from outside, but also operate in spaces where they coexist. sensitive keys, tokens and permissions. That is what recent research puts on the table: we are not simply facing a useful tool that can make mistakes, but rather an architecture that can also become dangerous if it is deployed without very clear limits. The alarm has been turned on Aonan Guan and Johns Hopkins researchers Zhengyu Liu and Gavin Zhong after demonstrating attacks against three agents deployed on the aforementioned platform: Claude Code Security Review, from Anthropic, Gemini CLI Action, from Google, and GitHub Copilot Agent, a GitHub tool under Microsoft. According to your documentation, The failures were communicated in a coordinated manner and ended in financial rewards paid by the companies, but what is relevant is that they point to a broader problem. This is how they managed to twist the agents from within The name that Guan gives to the discovery helps a lot to understand what this is all about: “Comment and Control.” The idea is simple to explain, although the substance is not so simple. Instead of setting up an external infrastructure to direct the attack, GitHub itself acts as an entry and exit channel: the attacker leave the instruction in a titlean incident or a comment, the agent processes it as if it were part of normal work and the result ends up reappearing within that same environment. Everything stays at home, and that is precisely the key to the problem. And that “everything stays at home” is not a minor detail, but the basis of what the research describes. The three agents share a very similar logic: they read normal content from GitHub, incorporate it as a work context, and from there, execute actions within automated flows. The clash appears because that same space not only contains text sent by third parties, but also tools, permissions and secrets that the agent needs to operate. The first case Guan details concerns Claude Code Security Review, an Anthropic GitHub action designed to review code changes and look for possible security flaws. Up to this point, everything is within what was expected. The problem, as the researcher explains, is that it was enough to introduce malicious instructions in the title of a pull requestwhich is the request that someone sends to propose changes to a project, so that the agent will execute commands and return the result as if it were part of your review. The team then managed to go a step further and demonstrate that it could also extract credentials from the environment. The interesting thing is that the same scheme also appeared in the other two services, although with nuances. At Google, Gemini CLI Action could be pushed to reveal the GEMINI_API_KEY from instructions snuck into an issue and its comments; In GitHub Copilot Agent, the variant was even more worrying, because the attack was hidden in an HTML comment that a person did not see on the screen, but the agent did process when another person assigned it to the case. In both scenarios, the background was the same again: apparently normal content that ended up twisting the behavior of the system until exposing credentials or sensitive information within GitHub itself. Guan assures that the pattern made it possible to leak API keys, GitHub tokens and other secrets exposed in the environment where the agent ran, that is, just the credentials that can later open the door to much more delicate actions. Who does this affect? Especially to repositories that run agents in GitHub Actions on content sent by untrustworthy collaborators and, in addition, give them access to secrets or powerful tools. The researcher himself clarifies that the risk depends a lot on the configuration: by default GitHub does not expose secrets to pull requests from forksbut there are deployments that open that door. And here another layer of the matter appears, less technical but just as important. As published by The RegisterAnthropic, Google, and GitHub ended up paying bounties for the findings, but none of the three had published public notices or assigned CVE at the time of that information. Guan was quite clear about this: he said he knew “for certain” that some users were still stuck on vulnerable versions and warned that, without visible communication, many may never know that they were exposed or even being attacked. So although there were mitigations and changes in documentation or in the internal treatment of reports, there was no equivalent public notice for all those potentially affected. Anthropic settled the case on November 25, 2025 and paid $100 Google rewarded the discovery on January 20, 2026 with $1,337 GitHub closed the case on March 9, 2026 with a payment of $500 What makes this case especially delicate is that GitHub does not seem like the end of the road, but rather the first visible showcase. Guan argues that the same pattern can probably be reproduced in other agents who work with tools and secrets within automatic flows, and there he mentions from Slack-connected bots to Jira agentsmail or deployment automation. The logic is the same again: if the system has to read external content to do its job and also has enough access to act, the field is fertile for someone to try to twist it from within. The conclusion that Guan reaches is not about selling a magic solution, but about returning to a fairly classic idea in security: giving each system only what is essential to do its job. If an agent reviews code, they shouldn’t have access to tools or secrets they don’t need; If you’re just summarizing issues, it wouldn’t make sense for you to write to GitHub or touch sensitive credentials. That … Read more

“We are not going to launch a flagship a year just for the sake of it”

If there is an immovable rule in the technological world, it is that every year a new generation of any product must be launched. If not more. The RAM market may explodebut what is certain is that every year we will have a new samsung galaxy and a new iPhone. And to the question of whether it is necessary to have a new high end mobile Every year, someone has answered that, perhaps, it is not necessary. It has been Nothing, and curiously it could do with a high-end. But… it makes sense. In short. Carl Pei is not only one of the founders of OnePlus: is the mind behind the launch of the Nothing brand. After landing in 2022the British company has relied on different marketing, but also on a CEO who is very active in networks, as well as open about the future of the company. Faced with the opacity of colleagues/rivals, Pei has always been quite ‘playful’ with the opinions of both the industry and his brand and the segment in general. In a recent self interview published on his YouTube channel, he has given an interesting key. “We’re not going to launch a new flagship every year just for the sake of it.” There are two melons here: one is that we won’t have the Nothing Phone (4) in 2026. The other is that you are quite right considering how things are. Rampant crisis in the background. Although companies like Micron, Samsung either NVIDIA It is coming in handy, we have been immersed in a -new- components crisis for weeks. RAM was the first product whose price turned this basic component into a luxury one, but the graphics cards and SSDs have followed the same path. And things do not look like they will improve in the short and medium term. This RAM crisis has already resonated in the smartphone segment. There are two options: either -much- more expensive mobile phones or mobile phones with -much- less RAM. Goodbye to the crazy 24 GB of memory on a mobile, welcome 4 GB. Pei himself already commented: if things continued like this, and they have remained the same, the user will have to choose between pay 30% more for a new mobile or settle for a new mobile phone at the same price as the previous one, but with less RAM (and the storage we would see). Come on, Pei has said, without saying it directly, what the decision would be with a Nothing Phone (4). Software > Hardware. Now, as they point out from Xataka Mobilethe fact that there is no new Nothing ‘flagship’ for 2026 does not mean that they are not going to launch a mobile phone. It is estimated that they are working on a mid-range Phone (4a) that will take up the baton of the notable Nothing Phone (3a) at the same time they keep the components short so that the price does not go down. And, furthermore, it gives meaning to an industry strategy, one in which the greatest advances that we have seen in recent generations have more to do with cloud services, artificial intelligence and everything that software encompasses… more than hardware. Yes, more powerful, faster and capable hardware is important to perform tasks within the device, but the cloud is also a pillar in this software. Qualcomm pushes another narrative. On the other hand, there is the strategy of some hardware companies that are obliged to keep the wheel turning. NVIDIA and Qualcomm are two examples, with more capable graphics cards not so much in terms of raw power performance, but rather better processing of artificial intelligence tasks such as DLSS. And also Qualcomm, which every year-end presents its new chips for mobile devicesand those are the ones we see in the new launches of the most premium range. Because each new generation is more powerful than the previous one and -may- have better cameras and more generous batteriesbut it is also true that from year to year we are not seeing considerable jumps between devices from the same brand. And that is when it makes complete sense for a company like Nothing to point out that, perhaps, this annualization of the ‘flagship’ is not necessary. It would be necessary to see what would happen in a context other than a component crisis, of course, but Pei himself has said on occasion that software is the future. Image | Xataka In Xataka | I had no idea what the future of the smartphone is. Until I spoke to Carl Pei

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.