Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,186 of 2,445    |
|    Mike Powell to All    |
|    IBM's AI 'Bob' could be m    |
|    10 Jan 26 09:35:17    |
      TZUTC: -0500       MSGID: 1943.consprcy@1:2320/105 2dc7a13c       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       IBM's AI 'Bob' could be manipulated to download and execute malware              Date:       Fri, 09 Jan 2026 16:50:00 +0000              Description:       Bob is also susceptible to indirect prompt injection, but only under specific       conditions.              FULL STORY              IBMs Generative Artificial Intelligence ( GenAI ) tool, Bob, is susceptible        to the same dangerous attack vector as most other similar tools - indirect       prompt injection.               Indirect prompt injection is when the AI tool is allowed to read the contents       found in other apps, such as email, or calendar.               A malicious actor can then send a seemingly benign email, or calendar entry,       which has a hidden prompt that instructs the tool to do nefarious things,        such as exfiltrate data, download and run malware , or establish persistence.              Risky permissions               Recently, security researchers Prompt Armor published a new report, stating       that IBMs coding agent, which is currently in beta, can be accessed either       through CLI (a terminal-based coding agent), or IDE (an AI-powered editor).       CLI is vulnerable to prompt injection, while IDE is vulnerable to known       AI-specific data exfiltration vectors.               We have opted to disclose this work publicly to ensure users are informed of       the acute risks of using the system prior to its full release, they said. We       hope that further protections will be in place to remediate these risks for       IBM Bob's General Access release.               There is a major caveat here, though. For the attackers to leverage this       attack vector, users must first configure Bob to grant it broad permissions.       Namely, the always allow permission needs to be enabled - for any command.               Thats quite the stretch, even for the least security-conscious users out       there. Since the tool is still in beta, we dont know if that permission is       enabled by default, but we doubt it will be.               In any case, Prompt Armor says the vulnerability allows threat actors to       deliver an arbitrary shell script payload to the victim, leveraging known and       custom malware variants to conduct different cyberattacks, such as        ransomware, credential theft, spyware, device takeover, botnet assimilation,       and more.                Via; PromptArmor               ======================================================================       Link to news story:       https://www.techradar.com/pro/security/ibms-ai-bob-could-be-manipulated-to-dow       nload-and-execute-malware              $$       --- SBBSecho 3.28-Linux        * Origin: Capitol City Online (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 134 206 275 300 307 317 400 426 428       SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200       SEEN-BY: 396/45 460/58 633/280 712/848 902/26 2320/0 105 107 304 3634/12       SEEN-BY: 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca