Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»How AI Coding Tools Crushed the Endpoint Security Fortress
    Cybersecurity

    How AI Coding Tools Crushed the Endpoint Security Fortress

    adminBy adminMarch 25, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    How AI Coding Tools Crushed the Endpoint Security Fortress
    Share
    Facebook Twitter LinkedIn Pinterest Email

    RSAC 2026 CONFERENCE – San Francisco – Artificial intelligence has been hailed by many as a game changer for cybersecurity, but one researcher believes these new tools are systemically undermining modern defenses.

    During a Tuesday session at the RSAC 2026 Conference in San Francisco, Oded Vanunu, chief technologist at Check Point Software, detailed what he describes as a “new era” of client-side attacks enabled by AI coding assistants. The session, titled “When AI Agents Become Backdoors: The New Era of Client-Side Threat,” revealed a series of vulnerabilities in popular tools such as Anthropic’s Claude Code, OpenAI’s Codex, and Google’s Gemini.

    Vanunu tells Dark Reading that he and his research team spent the past year investigating AI development tools and quickly discovered they were jeopardizing much of the progress made by the cybersecurity industry. Over the past decade, the industry invented “amazing platforms and technologies” to better protect endpoints and move application execution to the cloud, he says. 

    Related:Checkmarx KICS Code Scanner Targeted in Widening Supply Chain Hit

    “And then in just a few months, we saw that the AI tools were basically crushing everything that we had been fighting for,” Vanunu says.

    How AI Coding Assistants Break the ‘Endpoint Fortress’

    Vanunu says client-side risk has been reduced thanks to 20 years of cybersecurity advancements, from OS hardening and sandboxes to endpoint detection and response (EDR) and browser isolations. Additionally, the shift to software-as-a-service (SaaS) and cloud platforms effectively turned endpoints into thin clients and dramatically reduced the attack surface.

    But those advancements, which created an “endpoint fortress,” have been undone by AI coding assistants, which Vanunu says have “basically rewrote the rules entirely” because they require access to local filesystems and configurations on a developer’s endpoint. 

    Developers often assign the coding assistants the highest privileges and grant them broad access throughout the network, which allows the agents to burrow a tunnel through the fortress walls. And because the agents are automated and highly privileged, security technologies struggle to monitor what they’re doing and determine if the tasks are malicious.

    “At this moment, all security products are blind. Totally blind,” Vanunu tells Dark Reading. “They can’t really understand or control exactly what the agentic AI is doing.”

     

    A graphic explaining how AI coding tools have created a wormhole through modern endpoint defenses.

    Oded Vanunu’s session explained how AI coding tools have created a wormhole through modern endpoint defenses. SOURCE: Check Point Software

    To make matters worse, Vanunu says AI tools have an enormous blind spot of their own because they treat configuration files as active execution instructions. And while developers are cautious with .exe files, he says, they’re much less careful with .json, .env or .toml files. 

    Related:GitHub ‘OpenClaw Deployer’ Repo Delivers Trojan Instead

    Since there’s very little human oversight for these configuration files, threat actors can easily place a seemingly innocuous line of text in the configuration metadata that causes agents to, for example, run a malicious command. The metadata in these configuration files is “becoming the biggest enemy of these organizations,” Vanunu says, because they’re often overlooked.

    “What we’re seeing is that the attackers basically don’t need to create malware anymore,” he says. “They can just use config files.”

    Vulnerabilities in AI Coding Assistants

    Vanunu’s research team discovered six vulnerabilities in several popular AI coding tools, which have been previously disclosed and patched by the vendors. The first, CVE-2025-59536, is a high-severity flaw in Claude Code that allows an attacker to trick the tool into executing malicious code contained in a project before the user accepted the startup trust dialog. 

    Vanunu explains that attackers can exploit the flaw to weaponize Claude Code Hooks, which are user-defined shell commands designed to run automatically, and bypass endpoint detection and response (EDR) products. 

    Related:Trivy Supply Chain Attack Targets CI/CD Secrets

    A threat actor could also fashion a model context protocol (MCP) consent bypass. While Claude requires user consent for MCP server plug-ins to execute, Claude Code reads configurations automatically, which allows malicious MCP servers to execute commands in those files before the trust dialog appears.

    In OpenAI Codex CLI, the team found a code injection flaw, CVE-2025-61260 (CVSS score pending), that could be used in similar attacks. An attacker could use a project .env file to redirect the CLI to a malicious local .toml configuration file. That file then connects attacker-controlled MCP servers, which causes the coding tool to run commands immediately without human authorization.

    The research team also discovered CVE-2025-54136, a high-severity remote code execution (RCE) vulnerability in Cursor, an AI coding platform. When a developer approves an MCP server command, Cursor binds the authorization to the plug-in’s name rather than the content hash of what was approved. This allows a threat actor to execute a “swap attack” in which they submit a benign command and, after it’s been approved, update the plug-in with a malicious payload. 

    And lastly, Vanunu’s session detailed a flaw in Google’s Gemini CLI, which has not been assigned a CVE, that allows threat actors to disguise malicious commands as legitimate scripts within documentation files. An attacker can embed malicious commands in a GEMINI.md file, which the tool will silently execute without user approval or oversight.

    Mitigating AI Agent Cyber-Risks

    While all four companies addressed the flaw, Vanunu says they reveal dangerous attack paths that threat actors can easily exploit. They also show that “developers are the new perimeter.”

    To mitigate such threats, he urges organizations to start by conducting a full audit of their organization to identify all AI technology in use, especially “shadow AI” tools, and to analyze all configuration and project metadata for suspicious content.

    Secondly, he recommends that organizations implement isolation for their coding tools and require all AI-automated shell tasks to first run in sandboxes. And lastly, he urges security teams to adopt a “Configuration = Code” policy that treats developer workstations as a zero-trust environment where text cannot be executed without verification. 

    “The bottom line is that this is the new perimeter,” Vanunu says. “And we need to redesign security.”

    Coding Crushed Endpoint Fortress Security tools
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis is the best Home Assistant project you can do in an hour
    Next Article What People Are Getting Wrong This Week: Teleportation
    admin
    • Website

    Related Posts

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026

    Critical Nginx UI auth bypass flaw now actively exploited in the wild

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    YouTube Premium is now 50% off for certain Google One subscribers

    April 16, 2026

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Google adds campaign-level filtering to bulk ad review appeals

    April 16, 2026

    MKBHD pulls back the curtain on LG’s cancelled rollable

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,337)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (820)
    • Tech Tools & Mobile / Apps (1,600)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    YouTube Premium is now 50% off for certain Google One subscribers

    April 16, 2026

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Google adds campaign-level filtering to bulk ad review appeals

    April 16, 2026
    Most Popular
    • YouTube Premium is now 50% off for certain Google One subscribers
    • Windows is getting stronger RDP file protections to fight phishing attacks
    • Google adds campaign-level filtering to bulk ad review appeals
    • MKBHD pulls back the curtain on LG’s cancelled rollable
    • Medium-severity flaw in Microsoft SharePoint exploited
    • Google’s New Gemini App for Mac Comes With Two Key Benefits (and One Drawback)
    • OpenAI pulls out of a second Stargate data center deal
    • Critical Nginx UI auth bypass flaw now actively exploited in the wild
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.