bug-bounty432
google350
xss348
microsoft279
facebook245
apple171
exploit158
rce153
malware95
account-takeover94
cve87
csrf82
writeup78
bragging-post78
browser76
privilege-escalation66
react59
authentication-bypass57
cloudflare54
dos53
ssrf51
docker51
node49
aws47
access-control47
smart-contract45
phishing45
oauth45
ethereum43
defi42
supply-chain42
sql-injection41
web341
lfi37
idor34
smart-contract-vulnerability32
clickjacking31
web-application31
wordpress30
race-condition30
reverse-engineering30
info-disclosure29
vulnerability-disclosure29
cloud28
information-disclosure28
burp-suite28
solidity27
web-security27
cors26
responsible-disclosure26
0
7/10
research
A 2-week empirical study of six autonomous AI agents with real tools (email, shell, persistent storage) tested by 20 researchers in both benign and adversarial scenarios, documenting 10 security vulnerabilities (prompt injection, identity spoofing, non-owner compliance, social engineering bypass) and 6 cases of emergent safety behavior including cross-agent safety coordination without explicit instruction.
ai-security
autonomous-agents
prompt-injection
social-engineering
adversarial-testing
language-models
vulnerability-research
safety-evaluation
email-security
shell-access
persistent-memory
multi-agent-systems
access-control
identity-spoofing
denial-of-service
data-exposure
constraint-bypassing
emergent-behavior
Natalie Shapira
OpenClaw
Kimi K2.5
Claude Opus 4.6
ProtonMail
Discord
GitHub
Ash
Flux
Jarvis
Quinn
Mira
Doug