BACK_TO_FEEDAICRIER_2
Comment and Control exposes GitHub AI agents
OPEN_SOURCE ↗
REDDIT · REDDIT// 5h agoSECURITY INCIDENT

Comment and Control exposes GitHub AI agents

Security researcher Aonan Guan disclosed a prompt-injection attack that abuses GitHub PR titles, issue bodies, and comments to hijack Claude Code Security Review, Gemini CLI Action, and GitHub Copilot Agent in GitHub Actions. The core problem is architectural: these agents ingest untrusted repo content while running with secrets and execution tools in the same runtime, making credential theft possible through normal GitHub workflows.

// ANALYSIS

This is the clearest warning yet that agentic coding workflows are shipping with a broken trust boundary, not just a few bad prompts.

  • The attack does not rely on exotic infra bugs; it works by turning ordinary GitHub content that agents must read into malicious instructions.
  • Claude, Gemini, and Copilot each failed in different ways, which makes this bigger than a single vendor miss and points to a category-wide design flaw.
  • Copilot is the most alarming case because even added runtime defenses like env filtering, secret scanning, and network restrictions were reportedly bypassed.
  • Exfiltration through PR comments, issue comments, or git commits means the leak path can blend into normal collaboration activity instead of looking like classic malware traffic.
  • For teams deploying AI reviewers or coding agents in CI, the practical lesson is simple: never let untrusted input, shell access, and production secrets share the same execution context.
// TAGS
comment-and-controlclaude-codegemini-cligithub-copilotai-codingagentcode-reviewsafety

DISCOVERED

5h ago

2026-04-23

PUBLISHED

6h ago

2026-04-23

RELEVANCE

9/ 10

AUTHOR

Dagnum_PI