Malware uses AI tools for supply chain exploitation

Surprising nobody not hooked up to a firehose IV of VC money. "The malware did more than just steal SSH keys, npm tokens, and .gitconfig files - it weaponized AI CLI tools (including Claude, Gemini, and q) to aid in reconnaissance and data exfiltration. This marks the first known case where attackers have turned developer AI assistants into tools for supply chain exploitation." https://lnkd.in/gYws7CHV

"In a concerning new development, the malware attempts to abuse locally installed AI assistant CLIs (claude, gemini, q) to bypass traditional security boundaries. To our knowledge, this is one of the first documented cases of malware coercing AI‑assistant CLIs (claude/gemini/q) to assist in reconnaissance. The script prompts these tools with dangerous flags: --dangerously-skip-permissions --yolo --trust-all-tools" Incredible.

Brandon C.

Product-Minded Software Engineer | Empowering Devs with AI CLIs | Creator and Maintainer of Terminal Jarvis | Chronically Aware

3w
Brandon C.

Product-Minded Software Engineer | Empowering Devs with AI CLIs | Creator and Maintainer of Terminal Jarvis | Chronically Aware

3w

lol at being able to repost more than once. 😅 Sorry about the notification bombing Matt.

Like
Reply
Brandon C.

Product-Minded Software Engineer | Empowering Devs with AI CLIs | Creator and Maintainer of Terminal Jarvis | Chronically Aware

3w

This was actually such a great read though man. Going to check my repo for that s1ngularity-repository (initial glance: not there, thank god lol). Also, will make sure to share internally at Fiserv. Thanks again man!!!

See more comments

To view or add a comment, sign in

Explore content categories