- Penetration testing
- Research
- Tools and techniques
When project files become instructions: AI agents, CI pipelines and the new attack surface
AI agents now read repository files, skills, plugins and CI context as part of normal operation, which creates new attack paths across local development and automated workflows. This blog explains how those instruction channels work, why they matter from a security perspective, and what organisations should do to manage the risk before unsafe patterns become normalised.
- Penetration testing
- Tools and techniques
Common AI Implementation Mistakes to Avoid Part 5
Over the course of four articles, we have explored some of the most common AI implementation mistakes which have been observed during real tests. In this final article, we bring them together and outline the potentially devastating consequences for a business.
- Penetration testing
- Tools and techniques
Common AI Implementation Mistakes to Avoid Part 4
With the exploding use of AI in internal and external applications being rapidly deployed across all sectors, new chatbots, AIs, and versions are being constantly released. Whilst this offers exciting new capabilities, it also widens the potential attack surface of a company’s infrastructure – particularly if updates are not duly applied.