Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Tools Vulnerable to Comment-Based Prompt Injection

AI Tools Vulnerable to Comment-Based Prompt Injection

Posted on April 16, 2026 By CWS

A team of security experts has uncovered a new prompt injection attack, dubbed ‘Comment and Control’, which poses a threat to several popular AI-driven code automation tools.

Discovery of the Vulnerability

The vulnerability was identified by security researcher Aonan Guan, with contributions from Zhengyu Liu and Gavin Zhong from Johns Hopkins University. Their research revealed that the attack affects major AI agents, including Anthropic’s Claude Code Security Review, Google’s Gemini CLI Action, and GitHub Copilot Agent.

In a detailed blog post released on Wednesday, Guan explained how the exploit works. The attack method allows malicious actors to take advantage of GitHub comments, such as pull request titles and issue bodies, to hijack the AI agents associated with these tools.

Mechanics of the Attack

The research illustrates the potential for attackers to manipulate Claude Code Security Review by crafting a specific pull request title. This could lead the AI to execute unauthorized commands, potentially exposing sensitive information as security findings or entries in GitHub Actions logs.

For the Gemini CLI Action, attackers can use issue comments with crafted prompts to bypass security measures and gain access to full API keys. This poses a significant risk to the integrity of automated coding tasks.

In the case of GitHub Copilot Agent, the vulnerability allows attackers to hide malicious payloads within HTML comments. This approach can circumvent environment filters, scan for sensitive data, and bypass network firewalls.

Implications and Response

The researchers warn that the Comment and Control attack could have severe consequences, as it triggers malicious prompts automatically through GitHub Actions workflows. This process requires no intervention from the victim, except for the manual assignment of issues to the Copilot by the user.

The findings have been reported to the affected companies, Anthropic, Google, and GitHub, all of which have acknowledged the issue. While Anthropic labeled the vulnerability as ‘critical’, Google and GitHub classified it differently, with varying levels of severity.

In response, the companies have taken steps to mitigate the threat, with Google awarding a $1,337 bug bounty and GitHub offering $500. These efforts highlight the importance of addressing such vulnerabilities promptly.

Broader Security Concerns

This discovery marks the first public demonstration of a cross-vendor prompt injection pattern affecting multiple AI agents. Guan emphasized that the issue is more about the architectural design, where AI agents handle powerful tools and secrets in environments that process untrusted user inputs.

Despite the existence of several defense layers, including model-level and prompt-level protections, the inherent design allows for these injections to occur. The research calls attention to the necessity for a more robust architectural approach to safeguard against such vulnerabilities in the future.

Security Week News Tags:AI security, AI tools, Claude Code, code automation, Cybersecurity, Gemini CLI, GitHub Copilot, GitHub vulnerability, prompt injection, security research

Post navigation

Previous Post: Malicious Adobe Reader Download Conceals Remote Access Threat
Next Post: Chrome’s Privacy Risks: Fingerprinting and Header Leaks

Related Posts

Cisco Routers Hacked for Rootkit Deployment Cisco Routers Hacked for Rootkit Deployment Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
GoBruteforcer Botnet Targeting Crypto, Blockchain Projects GoBruteforcer Botnet Targeting Crypto, Blockchain Projects Security Week News
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak Security Week News
Critical Vulnerabilities Patched in Sophos Firewall Critical Vulnerabilities Patched in Sophos Firewall Security Week News
ShinyHunters Exploit Salesforce in New Data Breach Scheme ShinyHunters Exploit Salesforce in New Data Breach Scheme Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Awards $2.3 Million at 2026 Hacking Event
  • NWHStealer Malware Targets Windows via Fake VPN Sites
  • Cisco Addresses Critical Webex and ISE Security Flaws
  • Critical Splunk Vulnerability Allows Remote Code Execution
  • Ransomware Targets Autovista’s Global Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Awards $2.3 Million at 2026 Hacking Event
  • NWHStealer Malware Targets Windows via Fake VPN Sites
  • Cisco Addresses Critical Webex and ISE Security Flaws
  • Critical Splunk Vulnerability Allows Remote Code Execution
  • Ransomware Targets Autovista’s Global Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark