Security

54 articles about security.

Manus AI Vercel Key Authentication Leak in My Computer Mode

·8 min read

Manus AI's My Computer mode exposed Vercel API keys during local agent execution. Why credential isolation matters for desktop AI agents and how to prevent authentication leaks.

manusvercelauthenticationsecuritymy-computerapi-keysdesktop-agent

Third-Party Apps: What They Are, How Permissions Work, and Security Risks

·13 min read

A complete guide to third-party apps covering what they are, how they access your data through OAuth and APIs, common security risks, and how to audit and manage permissions across platforms.

third-party-appssecurityoauthpermissionsapiprivacy

AI Agent Blast Radius: What It Is and How to Measure It

·12 min read

AI agent blast radius defines the maximum damage an agent can cause in a single failure. Learn how to measure, categorize, and reduce blast radius across desktop, cloud, and code agents.

blast-radiusai-agentsecuritypermissionsrisk-managementdesktop-agent

AI Agent Trust Management: A Practical Framework for Production Systems

·12 min read

How to manage trust in AI agents across their lifecycle, from initial deployment with minimal permissions to earning expanded access through verified behavior.

ai-agentstrustagent-designsecuritypermissionsdesktop-agent

Data > Credentials in Power Automate: Managing Connections, Secrets, and Credential Storage

·13 min read

Learn how Data > Credentials works in Power Automate desktop flows. Covers credential types, secure storage, common errors, and how AI agents handle credentials differently.

power-automatecredentialsautomationsecurityrpa

How to Limit the Blast Radius of a Compromised AI Agent

·15 min read

Practical techniques to contain damage when an AI agent gets compromised. Covers process isolation, least-privilege tooling, network segmentation, and real

blast-radiusai-agentsecuritysandboxingpermissionsdesktop-agent

Verified Trust vs Assumed Trust in AI Agents

·11 min read

What is verified trust in the context of AI agents and how does it differ from assumed trust? A breakdown of both models, when each applies, and how to build agents you can actually trust.

verified-trustassumed-trustai-agenttrustsecurityopen-source

12 CVEs Indexed - Dependency Security in AI Agent Toolchains

·11 min read

Transitive dependencies in AI agent toolchains go unaudited. When your agent relies on npm packages, Python libraries, and MCP servers, the attack surface explodes. Here is how to find and fix the vulnerabilities hiding in your dependency tree.

securityai-agentdependenciescvesupply-chainauditing

93% No Scope. 0% Revocation.

·2 min read

Most agent integrations request broad permissions with no mechanism for revocation. No scope and no revocation is a terrifying combination.

permissionssecurityscoperevocationagent-safety

Adversarial Testing for AI Agent Memory Systems

·2 min read

What happens when you inject false information into an AI agent's memory? Adversarial testing reveals whether your agent can verify its own memories or

adversarial-testingmemorysecurityverificationagent-memory

AI Agent Confidence Calibration: When Pride Becomes a Security Risk

·2 min read

Overconfident AI agents skip verification and make dangerous assumptions. Learn how to calibrate agent confidence levels to prevent costly mistakes.

ai-agentsconfidence-calibrationsecurityverificationagent-design

Why AI Desktop Agents Need an Execution Authorization Layer

·2 min read

Every OS-level action an AI agent takes should pass through a policy layer first. Hard rules for dangerous operations, heuristics for edge cases.

ai-agentauthorizationpolicy-layerdesktop-automationsecurity

AI Agent Security in 2026 - Lessons from OpenClaw and Why Architecture Matters

·11 min read

The OpenClaw security crisis showed what happens when AI agents have unchecked access to your system. Here is what went wrong, what the industry learned

securityprivacyopenclawai-agentsarchitecture

Code That Cannot Phone Home - AI Agents for Air-Gapped Systems

·6 min read

Military systems, trading floors, and medical devices cannot use cloud AI APIs. Here is how local screen understanding via AXUIElement and on-device models like MLX enable AI agents in fully air-gapped environments.

air-gappedlocal-onlyscreen-understandingsecurityoffline

Auth Bypass Risks in AI-Generated Code

·3 min read

AI-generated code often has subtle authentication bypass vulnerabilities. Learn where auth middleware bugs hide and how to catch them before they ship.

securityauthenticationcode-reviewai-generated-codevulnerabilitieschatgptcoding

v2.1.78 Broke bypassPermissions: Skills Are User Content

·2 min read

When bypassPermissions broke, it revealed that .claude/skills/ files are user content, not system files. Agent permission models need to respect this boundary.

claude-codepermissionsskillssecurityagent-architecture

HTTP Requests as Unaudited Data Pipelines - When Error Reporting Leaks API Keys

·2 min read

Error reporting tools sending stack traces with API keys embedded. Every HTTP-capable dependency is a potential exfiltration path for sensitive data in AI

securityapi-keyserror-reportingdata-exfiltrationai-agent

Why Local-First AI Agents Are the Future of Desktop Automation

·9 min read

Cloud-based AI agents send your screen data to remote servers. Local-first agents like Fazm keep everything on your Mac. Here is why that matters more than

privacylocal-firstai-agentssecuritymacos

Local Inference Virtue Signaling

·2 min read

Running inference locally is not just a privacy flex - screenshots should genuinely never leave the machine. The case for local processing of visual data.

local-inferenceprivacyscreenshotsdesktop-agentsecurity

Machine-Enforceable Policy

·2 min read

Most AI agent policies rely on the honor system. OS-level sandboxing has gaps. Until policy enforcement is machine-verifiable, agent safety depends on trust

ai-safetypolicysandboxingsecurityai-agents

How Do I Make AI Use My Computer Safely?

·2 min read

Use MCP servers with the macOS accessibility API to let AI control your computer safely, with proper permission boundaries and audit trails.

mcpaccessibility-apimacossecuritydesktop-agent

Nobody Asks Where MCP Servers Get Their Data

·2 min read

MCP servers give AI agents powerful desktop automation capabilities. But the security trust surface - who controls what your agent accesses - is something

mcpsecuritytrustdesktop-automationai-agentsprivacy

Open Source Desktop Agents vs Closed Source - The Trust Problem

·2 min read

When an AI agent has full access to your desktop, open source is not just a preference - it is a trust requirement. You need to verify what the agent can

open-sourcetrustdesktop-agentsecuritytransparency

Why the OpenClaw AI Agent Is a Privacy Nightmare

·2 min read

Cloud-based desktop agents with open ports create massive privacy risks. Local agents with no exposed ports are private by design.

privacysecuritydesktop-agentlocal-firstopenclaw

Prompt Injection Through Tool Results: The Hidden Attack Vector

·3 min read

How tool results become prompt injection vectors for AI agents, and why system prompts are your best defense against malicious content in API responses.

prompt-injectionsecuritytool-resultssystem-promptagent-security

Safety Problems at the Execution Layer - Not in the Prompt

·6 min read

82% of MCP implementations have path traversal vulnerabilities. Real AI agent safety failures happen at execution, not planning. Here is what the CVE data shows and how to build execution-layer guardrails.

safetyexecution-layersecurityai-agentsguardrailsartificial

The Sandbox Paradox: AI Agents Need Access to Be Useful

·3 min read

AI agents need system access to be useful but restrictions to be safe. The sandbox paradox is the central tension in desktop agent design - here's how to

sandboxpermissionsai-agentsecuritydesktop-agent

Small Business and Home Network Setup - Separate VLANs for Everything

·6 min read

How to architect a combined home and small business network with separate VLANs using UniFi or pfSense. Includes VLAN numbering, firewall rules, and where AI agents fit into network automation.

networkingvlanssmall-businesshome-officesecurity

Special Token Injection Attacks on AI Coding Agents

·3 min read

Gaslighting LLMs with special token injection is a real threat to AI coding agents. Learn how these attacks work and how to defend your agent workflows.

securityprompt-injectionai-agentscode-reviewllm-attacks

Sybil Detection Through Timing Analysis - What Content Analysis Misses

·2 min read

Bot timestamp patterns reveal what content analysis cannot. Timing-based sybil detection catches coordinated inauthentic behavior more reliably than text

sybil-detectionbot-detectiontiming-analysissecurityanti-spam

Text-to-SQL Safety for AI Agents - Sanitization, Read-Only Access, and Ambiguous Joins

·2 min read

Running text-to-SQL on production databases with AI agents requires input sanitization, read-only access, and careful handling of ambiguous joins across

text-to-sqlai-agentdatabasesecuritysql

Trust vs Verify - Why Local Open Source AI Agents Are Easier to Trust

·3 min read

The difference between trusting and verifying an AI agent. Local, open source agents make trust simpler because you can inspect everything.

trustverificationopen-sourcelocal-agentsecurityai-agent

VPS + Docker for a Personal Desktop Agent Is Over-Engineering - The Security Math

·4 min read

Running a personal AI desktop agent on a VPS with Docker, Nginx, and Cloudflare tunnels adds attack surface without adding capability. Why local-first eliminates the entire security surface area.

desktop-agentvpsdockersecuritylocal-first

When AI Agents Choose Not to Know - Ignorance as a Security Boundary

·3 min read

Deliberate ignorance is an underrated security pattern for AI agents. An agent that never sees a credential cannot leak it. Choosing not to know is a design

ai-agentsecurityprivacyleast-privilegedesign-patterns

Yolo Mode vs Safe Permissions - When to Let Your AI Agent Run Free

·2 min read

Should you skip permission checks in AI agents? It depends on the task. Code agents with git are low risk. Desktop agents touching production systems need

ai-agentpermissionssecurityyolo-modesafety

Zelle Fraud Patterns: Social Engineering Meets Instant Money

·2 min read

Zelle fraud exploits instant, irreversible transfers combined with social engineering. Understanding authorization tricks helps build better fraud detection

zellefraudsocial-engineeringsecurityautomation

Zero-Trust Security for AI Agents: When Default Deny Goes Too Far

·2 min read

Zero-trust security models applied to AI agents can make them useless if too aggressive. Learn how to balance security with agent usefulness in production

zero-trustsecurityai-agentspermissionsagent-design

Why Your AI Agent Needs a Firewall - And Why It Should Be Open Source

·2 min read

AI coding agents access your file system, network, and APIs. An open-source firewall lets you audit exactly what the agent can do. Transparency beats trust.

firewallopen-sourceai-agentsecuritytransparency

Privacy Controls Are the Real Story in AI Agent Frameworks

·2 min read

Most agent frameworks let the model do whatever it wants. Privacy-first agents run everything locally, never send screen data to the cloud, and give users

privacyai-agentlocal-firstcontrolssecurity

AI Desktop Agent Security Best Practices for Teams and Enterprises

·10 min read

Giving AI agents access to your computer raises real security questions. Here are the best practices for deploying desktop agents safely - from permission

securityenterpriseai-agentsbest-practicescompliance

The Asymmetric Trust Problem - When Your AI Agent Has More Access Than You Intended

·6 min read

Granting macOS accessibility permissions to an AI agent gives it access to every text field, password manager value, and bank balance visible on screen. The permission you think you granted is a small subset of what you actually granted.

trustpermissionsaccessibility-apisecurityai-agent

Blast Radius - What Happens When Your AI Agent Gets Compromised

·2 min read

MCP servers limit blast radius by design with UI-only access, no shell, no filesystem. But in practice, both tools often run in the same session. Here is

securityai-agentblast-radiusmcptrust-boundary

Bypass Permissions vs Allowlists - Finding the Middle Ground for AI Agents

·2 min read

Full permission bypass is reckless and full approval mode is unusable. The middle ground with allowlists is where AI agent permissions actually work.

ai-agentspermissionssecuritydeveloper-experiencedesktop-automation

Why Community Skill Repos Need Platform-Level Sandboxing

·2 min read

Community skills repos are an open attack vector for AI agents. Platform-level sandboxing and verification are essential to prevent supply chain attacks.

securityskillssandboxingsupply-chainai-agents

Cron Jobs and Unsupervised Root Access - The Security Risk of Scheduled AI Agents

·3 min read

Why scheduled autonomous AI agent tasks need audit trails, rate limits, and human review. The security implications of launchd agents running unsupervised

cron-jobsai-agentsecuritylaunchdautonomous-agentsrate-limiting

Using macOS Keychain for AI Agent Credential Access

·2 min read

Store passwords in macOS Keychain for your AI agent instead of .env files. It is more secure, centralized, and eliminates token pasting across sessions.

macoskeychaincredentialssecurityai-agents

MEMORY.md as an Injection Vector - The Security Risk of Implicitly Trusted Config Files

·3 min read

CLAUDE.md and MEMORY.md files are loaded every session and trusted implicitly by AI agents. This makes them a potential prompt injection vector that most

securityprompt-injectionmemoryclaude-mdconfig-filesai-agent

Your AI Agent Shouldn't Send Screen Recordings to the Cloud

·2 min read

Some agents capture your screen and send it to cloud servers for processing. Local agents process everything on device - your data never leaves your machine.

screen-recordingscloudprivacyon-devicesecurity

Why Self-Hosting AI Matters: Your Agent Sees Your Emails, Documents, and Browsing History

·2 min read

AI agents interact with your most sensitive data - emails, documents, browsing history. Self-hosting with local LLMs keeps that data on your machine where

privacyself-hostinglocal-llmai-agentssecurity

The Auth Problem for AI Agents - OAuth, Rate Limiting, and Dry Run Modes

·3 min read

AI agents face unique authentication challenges: automating OAuth browser flows, managing rate limits across multiple instances, and testing with dry run modes.

authenticationoauthai-agentrate-limitingsecurity

Why Local-First AI Agents Are the Future (And Why It Matters for Your Privacy)

·14 min read

AI agents that control your computer need access to everything on your screen. Here is why where that data gets processed - locally or in the cloud - is the

privacylocal-firstai-agentssecuritythought-leadership

How to Keep Your .env Files Safe from AI Coding Agents

·6 min read

In 2025, PromptArmor showed that poisoned web sources can manipulate AI agents to exfiltrate .env credentials via terminal commands. Here is the multi-layer defense: .claudeignore, keychain proxy, and vault patterns.

securitysecretsclaude-codedeveloper-toolsbest-practices

AI Agent Permissions - Why Local Agents Do Not Have the Cloud Permission Problem

·3 min read

Cloud AI agents like Cowork need folder-level access grants that linger after tasks complete. Local agents that use accessibility APIs avoid this entirely.

permissionssecuritylocal-firstcloud-agentscomparison

Prompt Injection and AI Agents - Why Browser-Based Agents Have a Bigger Attack Surface

·3 min read

AI agents that run inside the browser inherit whatever the page feeds them, including injection payloads. Native agents that interact from outside have a

securityprompt-injectionbrowser-agentsnative-agentsai-safety

Browse by Topic