A team of researchers from UC Berkeley have demonstrated that eight AI agent benchmarks can be manipulated to produce ...
A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.