bug-bounty405
google392
xss350
microsoft305
facebook274
apple184
exploit182
rce174
malware136
cve107
account-takeover94
csrf86
browser85
writeup69
privilege-escalation66
phishing61
dos60
react59
supply-chain56
bragging-post55
authentication-bypass54
cloudflare51
node51
ssrf49
aws48
docker48
access-control46
smart-contract45
reverse-engineering45
web344
ethereum43
defi42
pentest41
oauth41
sql-injection40
lfi35
idor35
race-condition33
info-disclosure33
smart-contract-vulnerability32
cloud31
buffer-overflow30
auth-bypass29
wordpress29
clickjacking29
solidity27
subdomain-takeover27
vulnerability-disclosure25
web-application24
sqli23
0
2/10
research
This article discusses a social engineering attack that exploits Claude Opus through the OpenClaw integration, demonstrating how an attacker can manipulate an AI agent into divulging sensitive information or credentials within 50 messages by exploiting trust relationships in MCP (Model Context Protocol) implementations.
social-engineering
prompt-injection
ai-agents
mcp
model-context-protocol
claude
llm-security
jailbreak
OpenClaw
Claude Opus
Runlayer
Anthropic
OWASP
0
2/10
threat-intel
This is a Runlayer marketing/blog hub aggregating articles about Model Context Protocol (MCP) security risks including prompt injection, social engineering of AI agents, malicious MCP servers, and data exfiltration vulnerabilities, along with enterprise security solutions and best practices for securing MCP implementations.
mcp
model-context-protocol
ai-agent-security
prompt-injection
social-engineering
data-exfiltration
oauth
dynamic-client-registration
enterprise-security
tool-gateway
owasp-top-10
sandbox
authentication
access-control
Runlayer
OpenAI
Anthropic
Google
Claude Opus
OpenClaw
Cursor
GitHub
Box
AAIF
Linux Foundation
OWASP
Vitor Balocco
Tal Peretz
Alex Frazer
Jake Moghtader