Security Blogs
The Hidden Risk in Notion 3.0 AI Agents: Web Search Tool Abuse for Data Exfiltration
A critical security vulnerability in Notion 3.0's AI Agents demonstrates how the combination of LLM agents, tool access, and long-term memory creates exploitable attack vectors for data exfiltration.
By Abi Raghuram
Tracing Agent Tool Flows: A Taint-Analysis View of Tool Calls
We apply taint analysis to AI agent tool calls to trace how private or untrusted inputs can flow through tools (sources) and lead to risky outputs or side-effects (sinks), enabling systematic risk detection of data leaks and tampering.
By Steven Jung
Shopify Exploit: Manipulating Shoppers
A critical vulnerability in Shopify's MCP allows attackers to manipulate consumer purchasing decisions using malicious prompts in product descriptions.
By Abi Raghuram
Neon Exploit: Malicious SQL Injection
Attackers can exploit the Neon MCP server to execute malicious SQL operations. Learn how to protect your database from these threats.
By Abi Raghuram
Azure Exploit: Leaking KeyVault Secrets
A critical vulnerability in Azure's MCP allows attackers to leak KeyVault secrets using malicious prompts.
By Abi Raghuram
Heroku Exploit: App Ownership Takeover
A critical vulnerability allows attackers to transfer ownership of a Heroku app by injecting a malicious prompt into its logs.
By Abi Raghuram
Linear Exploit: Bypassing Team ACLs
A critical vulnerability in Linear's MCP allows attackers to bypass team access controls and exfiltrate confidential data using malicious prompts.
By Abi Raghuram