Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitHub AI Agents Exposed to New Vulnerability

GitHub AI Agents Exposed to New Vulnerability

Posted on April 21, 2026 By CWS

A newly identified security threat known as ‘Comment and Control’ has uncovered a significant vulnerability across multiple AI coding agents operating within GitHub. This threat exploits GitHub’s pull request titles, issue bodies, and comments to execute prompt injections, allowing attackers to capture sensitive API keys and tokens within CI/CD environments.

Understanding the Vulnerability

The ‘Comment and Control’ attack is named after the traditional Command and Control framework utilized in malware operations. It affects three major AI agents: Anthropic’s Claude Code Security Review, Google’s Gemini CLI Action, and GitHub Copilot Agent. These agents were found susceptible to this vulnerability, leading to potential data breaches.

Security researcher Aonan Guan highlighted that the entire attack procedure occurs within GitHub. By crafting malicious pull request titles or issue comments, attackers can manipulate AI agents to follow harmful instructions, ultimately leading to credential leaks via GitHub’s own communication channels, such as comments or commits.

Mechanics of the Attack

Contrasting with older prompt injection methods that require user interaction, ‘Comment and Control’ operates proactively. GitHub Actions workflows trigger automatically upon pull request or issue events, meaning that simply opening a pull request or submitting an issue can activate these agents without any direct engagement from the victim.

For instance, in Anthropic’s Claude Code Security Review, the pull request title is directly integrated into the AI’s prompt with no sanitization. This oversight allows attackers to execute commands and exfiltrate credentials like ANTHROPIC_API_KEY and GITHUB_TOKEN, as confirmed by Anthropic with a critical CVSS rating of 9.4.

Case Studies and Mitigations

Google’s Gemini CLI Action also suffers from this vulnerability, where malicious inputs can override the agent’s safety instructions and expose the GEMINI_API_KEY publicly. This flaw, reported by Neil Fendley and colleagues, earned a $1,337 bounty from Google.

In the case of GitHub Copilot, the attack bypassed multiple security layers, such as environment variable filtering and network firewalls. Despite initial dismissal as a known issue, GitHub recognized the severity following proof of concept and awarded a $500 bounty.

Experts recommend employing allowlist tools, minimizing secret privileges, implementing human approval for critical actions, and conducting thorough audits of AI integrations in CI/CD pipelines to mitigate these risks.

As this vulnerability demonstrates, AI agents processing untrusted data with tool and secret access are at risk, extending beyond GitHub Actions to include AI agents in platforms like Slack and Jira.

For ongoing updates in cybersecurity, follow us on Google News, LinkedIn, and X. If you have a story to share, reach out to us.

Cyber Security News Tags:AI agents, AI vulnerability, Anthropic, CI/CD, Claude Code, Cybersecurity, Gemini CLI, GitHub, GitHub actions, GitHub Copilot, Google, prompt injection, security flaws

Post navigation

Previous Post: CISA Highlights New Vulnerabilities, Sets Federal Deadlines
Next Post: SideWinder Targets Government Emails with Fake PDF Viewer

Related Posts

Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Cyber Security News
Critical Chrome Security Flaws Allow Remote Code Execution Critical Chrome Security Flaws Allow Remote Code Execution Cyber Security News
SmartApeSG Campaign Exploits ClickFix for Malware Spread SmartApeSG Campaign Exploits ClickFix for Malware Spread Cyber Security News
5 New Trends In Phishing Attacks On Businesses  5 New Trends In Phishing Attacks On Businesses  Cyber Security News
Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims Cyber Security News
Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Group Implicated in $290M Kelp DAO Crypto Theft
  • SideWinder Targets Government Emails with Fake PDF Viewer
  • GitHub AI Agents Exposed to New Vulnerability
  • CISA Highlights New Vulnerabilities, Sets Federal Deadlines
  • Gardyn Smart Garden Flaws Risk Remote Control by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Group Implicated in $290M Kelp DAO Crypto Theft
  • SideWinder Targets Government Emails with Fake PDF Viewer
  • GitHub AI Agents Exposed to New Vulnerability
  • CISA Highlights New Vulnerabilities, Sets Federal Deadlines
  • Gardyn Smart Garden Flaws Risk Remote Control by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark