Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/Claude, Gemini, Copilot Vulnerable to Prompt Injection
CyberSecurity News

Claude, Gemini, Copilot Vulnerable to Prompt Injection

A critical cross-vendor vulnerability class, dubbed “Comment and Control,” has emerged, representing a new category of prompt injection attacks. This technique weaponizes GitHub pull request titles,...

Emy Elsamnoudy
Emy Elsamnoudy
April 21, 2026 4 Min Read
8 0

A critical cross-vendor vulnerability class, dubbed “Comment and Control,” has emerged, representing a new category of prompt injection attacks. This technique weaponizes GitHub pull request titles, issue bodies, and issue comments to hijack AI coding agents and steal API keys and access tokens directly from CI/CD environments, as detailed by researchers.

Table Of Content

  • Finding 1: Claude Code Security Review — PR Title to RCE
  • Finding 2: Gemini CLI Action — Issue Comment to API Key Leak
  • Finding 3: Copilot Agent — Three-Layer Defense Bypass
  • Mitigations

The attack name is a deliberate play on the classic Command and Control (C2) framework used in malware campaigns. Three widely deployed AI agents, Anthropic’s Claude Code Security Review, Google’s Gemini CLI Action, and GitHub Copilot Agent (SWE Agent), were confirmed vulnerable.

According to researcher Aonan Guan, the entire attack loop runs within GitHub itself: an attacker writes a malicious PR title or issue comment, the AI agent reads and processes it as trusted context, executes attacker-supplied instructions, and exfiltrates credentials back through a PR comment, issue comment, or git commit, no external server required.

Attack Pattern

Unlike classic indirect prompt injection, which is reactive and requires a victim to explicitly ask the AI to process a document, Comment and Control is proactive: GitHub Actions workflows auto-trigger on pull_request, issues, and issue_comment events, meaning simply opening a PR or filing an issue can activate the agent without any victim interaction.

Finding 1: Claude Code Security Review — PR Title to RCE

In Anthropic’s Claude Code Security Review action, the PR title is directly interpolated into the agent’s prompt with zero sanitization. Because the Claude CLI is invoked without --disallowed-tools or --allowed-tools restrictions, the subprocess inherits all environment variables including ANTHROPIC_API_KEY and GITHUB_TOKEN.

An attacker simply opens a PR with a malicious title that breaks out of the prompt context and instructs Claude to execute whoami, ps auxeww, or env — returning the full credential dump as a JSON “security finding” posted to the PR comment. Rated CVSS 9.4 Critical by Anthropic (upgraded from 9.3), the bug was reported via HackerOne (#3387969) and awarded a $100 bounty.

Finding 2: Gemini CLI Action — Issue Comment to API Key Leak

Google’s Gemini CLI Action includes issue titles, bodies, and comments in the agent’s prompt context under an “Additional Content” section. By injecting a fake “Trusted Content Section” immediately after it, an attacker overrides Gemini’s safety instructions, causing Gemini to post the GEMINI_API_KEY as a public issue comment, visible to anyone.

Reported to Google VRP (#1609699) by researcher Neil Fendley alongside Johns Hopkins University collaborators, the vulnerability earned a $1,337 bounty.

Finding 3: Copilot Agent — Three-Layer Defense Bypass

The GitHub Copilot Agent finding is the most technically sophisticated. GitHub had implemented three runtime-level mitigations environment variable filtering, secret scanning, and network firewall — all of which were bypassed:

  • Env Filtering Bypass: The UU() function filters sensitive variables only from the child bash subprocess. Running ps auxeww from that subprocess reads /proc/[pid]/environ of the unfiltered parent Node.js process and MCP server, recovering GITHUB_TOKEN, GITHUB_COPILOT_API_TOKEN, and two additional credentials.
  • Secret Scanning Bypass: GitHub’s scanner detects ghs_/ghu_ token prefixes. Base64-encoding the output before committing evades all pattern matching.
  • Firewall Bypass: The encoded credential file is exfiltrated via a standard git push to a PR — a whitelisted operation — making it indistinguishable from normal Copilot workflow activity.

Adding another layer of stealth, the attack payload is hidden inside an HTML comment in the issue body, invisible in GitHub’s rendered Markdown view but fully parsed by the AI agent.

A victim sees only an innocent visible request and unknowingly assigns the issue to Copilot. The bug was reported via HackerOne (#3544297), initially dismissed as a “known issue” but reopened after the researcher submitted reverse-engineered source code proof from Copilot’s minified index.js. GitHub ultimately awarded a $500 bounty.

Component Injection Surface Exfiltration Channel Credentials Leaked Bounty
Claude Code PR title PR comment ANTHROPIC_API_KEY, GITHUB_TOKEN $100
Gemini CLI Issue comments Issue comment GEMINI_API_KEY $1,337
Copilot Agent Issue body (HTML comment) Git commit GITHUB_TOKEN, COPILOT_API_TOKEN, +2 more $500

All three vulnerabilities share the same architectural flaw: untrusted GitHub data flows into an AI agent that holds production secrets and unrestricted tool access in the same runtime.

As researchers noted, this is the first public cross-vendor demonstration of a single prompt injection pattern defeating multiple major AI agents including one that had three dedicated runtime defenses in place.

Security experts warn the pattern extends well beyond GitHub Actions to any AI agent processing untrusted input with access to tools and secrets, including Slack bots, Jira agents, email agents, and deployment automation pipelines.

Mitigations

  • Allowlist tools, never blocklist — use --allowed-tools to grant only the minimum required capabilities; blocklisting (e.g., blocking ps) is trivially bypassed with alternatives like cat /proc/*/environ.
  • Least-privilege secrets — agents performing read-only tasks, like issue triage, should not hold GITHUB_TOKEN with write scope.
  • Require human approval gates before agents perform outbound actions or access credentials.
  • Audit all AI agent integrations in CI/CD pipelines and monitor Actions logs for anomalous credential-access patterns.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

SideWinder Uses Fake Chrome PDF Viewer and Zimbra Clone to Steal

Next Post

TikTok Video Downloader Extensions Compromise 130k

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us