It's kinda awesome that after decades of software and hardware advancements to prevent computers from arbitrarily executing data as instructions, we've decided to let agents arbitrarily execute data as instructions.
Or find it surprising that probabilistic tool based on generating things can do things when you give it rights to do things... And that you can not effectively program it to not do something....<p>You gave it capability to delete emails. Why did you expect it not to do that at least some of the time? And with enough user some of the time will most likely happen...
We're in the same era where lots of peoples' installation guides for the software they want people to use is essentially boiled down to "sudo curl | bash" and/or just "blindly install this thing with 37 npm dependencies", so I'm not surprised in the slightest.<p>But wait, hold my beer, now we've got people turning openclaw type tools loose in their systems to do things as sudo or install software packages from supply-chain-attack vulnerable repositories with no human intervention whatsoever!
All these developments show that:<p>1) Despite what people say about security and privacy, most are willing sacrifice both for the sake of potential convenience<p>2) Our priorities for the past decades have been wrong, or the times have changed and we should reevaluate them all
OpenClaw even has a readwrite
1Password plugin.
Well, yeah. It's that or pay a person to do it. When a person screws up, it's because they're stupid and lazy. When an AI agent does it, it's because, hey, technological frontier at work here, have you thought about refining your prompt? We need you to refine the prompt. Otherwise it's bad for our IPO.
Has XKCD made another Bobby tables comic for prompt injection?
"The PromptArmor Threat Intel Team responsibly disclosed this vulnerability to Ramp. Ramp's security team indicated that the issue was resolved on May 16, 2026." I think they mean March here
Concidentially, today I was watching and interview with a lead designer from Ramp who is telling about how they are full ia, agents and automation <a href="https://youtu.be/KPDXMtmkcgk" rel="nofollow">https://youtu.be/KPDXMtmkcgk</a>
Ramp does seem to have a genuinely good product, but every time I interact with anyone who works on it, I'm struck by how much they want to talk about how hardcore and advanced their working style is. This was true before AI, and it's very true now
Find it funny that PromptArmor needed to reach out 3 times in a row to get a nearly month-late response that the issue "was resolved"
Why is Ramp even building a sheets product? That's the question zero that popped up to my head.
So we know Claude’s mitigation. What is Ramp’s? Same warning dialog?<p>It’s funny that this technology only admits in-band signaling. Given that, any foreign content is risky. It’s actually quite interesting that the current technological ecosystem is built around a high trust situation: npm, pip, cargo all run foreign code in the developer context and communities have norms of downloading random people’s modules.<p>And so I suppose it’s no surprise that we use LLMs - another tech that is high-trust: since it has no out of band signaling ability.<p>But it seems like we’re very close to the end of the era where someone will use (in a sensitive system) arbitrary web content carrying the equivalent of merged code/data.
I once read about the signalling view of advertising, meaning it's used to show that a company is so prosperous that it can afford spending a lot of money in advertising. In the same way, I think from now on, as much as possible, I'll only buy from companies that will publicly make it a point not to use AI internally. AI use should brand companies as desperate and unreliable.
[dead]
[dead]
What about this is a vulnerability, let alone one that requires responsible disclosure?<p>Untrusted data sources can provide data that causes bad things to occur. If that's a vulnerability, then any application that ingests data is riddled with vulnerabilities.<p>I agree that the behavior should change from a default of allowing external network requests to denying them, but this "report" reads like overly dramatic marketing BS.
> Untrusted data sources can provide data that causes bad things to occur. If that's a vulnerability, then any application that ingests data is riddled with vulnerabilities.<p>There's an important difference between "the import had bad numbers so the report is wrong" versus "the import had a virus and now our network is compromised."<p>They are not the same kind of failure, they don't have the same impacts, and they don't involve the same mechanisms for prevention, detection, or remediation.
Yes, stamping out file format vulnerabilities is indeed a Sisyphean task<p>For example <a href="https://en.wikipedia.org/wiki/Melissa_(computer_virus)" rel="nofollow">https://en.wikipedia.org/wiki/Melissa_(computer_virus)</a>