<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Securityv0 — AI Execution Intelligence Monitor</title><description>Analysis of real AI agent and automation incidents through the execution path lens.</description><link>https://securityv0.com/</link><language>en-us</language><item><title>Semantic Kernel CVEs: Unproven Execution by Default</title><link>https://securityv0.com/intelligence/2026-05-10-semantic-kernel-default-tools-unproven-execution/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-05-10-semantic-kernel-default-tools-unproven-execution/</guid><description>Microsoft disclosed two RCE flaws in Semantic Kernel where framework defaults exposed code-execution sinks to prompt-injected LLM agents</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>semantic-kernel</category><category>microsoft</category><category>llm-agent</category><category>prompt-injection</category><category>unproven-execution</category><category>asi05</category></item><item><title>Azure SRE Agent: Any Tenant Could Watch Live Sessions</title><link>https://securityv0.com/intelligence/2026-05-08-azure-sre-agent-cross-tenant-eavesdrop/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-05-08-azure-sre-agent-cross-tenant-eavesdrop/</guid><description>CVE-2026-32173: a multi-tenant Entra ID misconfig let any Microsoft account subscribe to another customer&apos;s live Azure SRE Agent session</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>Supply Chain Compromise</category><category>azure</category><category>ai-agent</category><category>nhi-compromise</category><category>entra-id</category><category>signalr</category><category>asi06</category></item><item><title>OpenAI Codex: Hidden Branch Names, Stolen GitHub Tokens</title><link>https://securityv0.com/intelligence/2026-05-04-openai-codex-branch-name-token-theft/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-05-04-openai-codex-branch-name-token-theft/</guid><description>BeyondTrust disclosed an OpenAI Codex command injection that piped attacker-crafted branch names into git clone, exfiltrating GitHub OAuth tokens</description><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><category>Supply Chain Compromise</category><category>openai</category><category>codex</category><category>ai-coding-agent</category><category>command-injection</category><category>github-oauth</category><category>nhi-compromise</category></item><item><title>Flowise CSV Agent RCE: Unproven Execution Encore</title><link>https://securityv0.com/intelligence/2026-05-03-flowise-csv-agent-rce/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-05-03-flowise-csv-agent-rce/</guid><description>CVE-2026-41264 turns Flowise&apos;s CSV Agent into a remote Python interpreter — the same unproven_execution pattern Langflow shipped six weeks ago</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>flowise</category><category>csv-agent</category><category>prompt-injection</category><category>unproven-execution</category><category>asi05</category><category>ai-workflow</category></item><item><title>PromptMink: AI-Authored npm Commit Plants Backdoor</title><link>https://securityv0.com/intelligence/2026-05-02-promptmink-ai-coauthored-npm-supply-chain/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-05-02-promptmink-ai-coauthored-npm-supply-chain/</guid><description>A Claude Opus co-authored commit added a Layer-1 bait npm dependency that pulled a Famous Chollima credential-stealing payload</description><pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>npm</category><category>supply-chain</category><category>ai-coding-agent</category><category>dprk</category><category>famous-chollima</category><category>transitive-dependency</category></item><item><title>Lightning PyPI Hit: Mini Shai-Hulud Reaches AI Training</title><link>https://securityv0.com/intelligence/2026-05-01-lightning-pypi-mini-shai-hulud/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-05-01-lightning-pypi-mini-shai-hulud/</guid><description>Two malicious lightning PyPI releases on April 30 stole CI credentials and weaponized AI coding agent configs as a persistence vector for the campaign</description><pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate><category>Supply Chain Compromise</category><category>supply-chain</category><category>nhi</category><category>pypi</category><category>shai-hulud</category><category>ai-training</category><category>claude-code</category></item><item><title>PocketOS volumeDelete: Scope Drift via Blanket Token</title><link>https://securityv0.com/intelligence/2026-04-30-pocketos-cursor-volumedelete-scope-drift/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-04-30-pocketos-cursor-volumedelete-scope-drift/</guid><description>A Cursor agent running Claude Opus 4.6 wiped PocketOS&apos;s production database in nine seconds after foraging for a Railway token with no scope isolation</description><pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate><category>Scope Drift</category><category>pocketos</category><category>cursor</category><category>scope-drift</category><category>ai-agent</category><category>railway</category><category>asi03</category></item><item><title>prt-scan: pull_request_target as Unproven Execution</title><link>https://securityv0.com/intelligence/2026-04-26-prt-scan-pull-request-target-campaign/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-04-26-prt-scan-pull-request-target-campaign/</guid><description>Six waves of malicious PRs hijacked GitHub Actions runners whose pull_request_target workflows executed fork-supplied code with secret scope</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>prt-scan</category><category>github-actions</category><category>unproven-execution</category><category>supply-chain</category><category>ci-cd</category><category>asi05</category></item><item><title>LMDeploy SSRF: The Inference NHI Was the Real Target</title><link>https://securityv0.com/intelligence/2026-04-24-lmdeploy-ssrf-vlm-iam-exfil/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-04-24-lmdeploy-ssrf-vlm-iam-exfil/</guid><description>A vision-language image loader in LMDeploy became an SSRF primitive, exposing GPU node IAM credentials 12 hours after CVE-2026-33626 disclosure</description><pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate><category>Supply Chain Compromise</category><category>lmdeploy</category><category>nhi</category><category>ssrf</category><category>vlm</category><category>iam</category><category>asi06</category></item><item><title>MCP STDIO Defaults: Unproven Execution by Design</title><link>https://securityv0.com/intelligence/2026-04-22-anthropic-mcp-stdio-design-flaw-rce/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-04-22-anthropic-mcp-stdio-design-flaw-rce/</guid><description>A systemic design flaw in Anthropic&apos;s MCP SDKs lets STDIO-spawned servers execute arbitrary code in the host process the operator never authorized</description><pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>mcp</category><category>anthropic</category><category>unproven-execution</category><category>supply-chain</category><category>llm-agent</category><category>asi05</category></item><item><title>Comment and Control: AI Agents Hijacked via PR Comments</title><link>https://securityv0.com/intelligence/2026-04-22-comment-and-control-ai-agent-prompt-injection/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-04-22-comment-and-control-ai-agent-prompt-injection/</guid><description>Three AI coding agents running in GitHub Actions can be hijacked via attacker-controlled PR and issue comments, leaking production secrets</description><pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>comment-and-control</category><category>prompt-injection</category><category>github-actions</category><category>claude-code</category><category>gemini-cli</category><category>github-copilot</category></item><item><title>Vercel Breach: The AI Agent&apos;s OAuth Token Was the Identity</title><link>https://securityv0.com/intelligence/2026-04-20-vercel-context-ai-oauth-breach/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-04-20-vercel-context-ai-oauth-breach/</guid><description>A Context.ai AI agent&apos;s OAuth token, delegated &apos;Allow All&apos; by a Vercel employee, was stolen from a vendor laptop and replayed into Vercel&apos;s internals.</description><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><category>Supply Chain Compromise</category><category>supply-chain</category><category>nhi</category><category>oauth</category><category>ai-agent</category><category>vercel</category><category>context-ai</category></item><item><title>LiteLLM PyPI Attack: Every Hop Was a Machine Identity</title><link>https://securityv0.com/intelligence/2026-03-25-litellm-pypi-supply-chain-attack/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-03-25-litellm-pypi-supply-chain-attack/</guid><description>TeamPCP backdoored litellm on PyPI via a poisoned Trivy GitHub Action, stealing PyPI tokens and harvesting SSH keys, cloud creds, and K8s configs.</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><category>Supply Chain Compromise</category><category>supply-chain</category><category>nhi</category><category>pypi</category><category>ci-cd</category><category>litellm</category><category>teampcp</category></item><item><title>Meta&apos;s Internal AI Agent Posts Unsolicited Advice, Triggers Sev 1 Data Exposure</title><link>https://securityv0.com/intelligence/2026-03-18-meta-rogue-agent-sev1-data-exposure/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-03-18-meta-rogue-agent-sev1-data-exposure/</guid><description>An in-house AI agent at Meta autonomously published a recommendation on an internal forum, setting off a chain of events that exposed sensitive data to unauthorized employees for two hours.</description><pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate><category>Scope Drift</category><category>meta</category><category>rogue-agent</category><category>scope-drift</category><category>data-exposure</category><category>agentic-ai</category><category>insider-risk</category></item><item><title>CVE-2026-27966: Langflow&apos;s Hardcoded Python REPL Turns CSV Uploads Into RCE</title><link>https://securityv0.com/intelligence/2026-03-09-langflow-csv-agent-rce-repl/</link><guid isPermaLink="true">https://securityv0.com/intelligence/2026-03-09-langflow-csv-agent-rce-repl/</guid><description>A hardcoded flag in Langflow&apos;s CSV Agent exposed a Python execution tool to prompt injection, granting attackers full server access.</description><pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate><category>Unproven Execution</category><category>langflow</category><category>prompt-injection</category><category>rce</category><category>python-repl</category><category>agentic-execution</category></item></channel></rss>