Scan to download
BTC $79,065.78 -2.99%
ETH $2,226.88 -2.79%
BNB $672.50 -1.60%
XRP $1.43 -4.21%
SOL $89.19 -3.45%
TRX $0.3520 -0.39%
DOGE $0.1127 -3.79%
ADA $0.2614 -3.98%
BCH $426.22 -2.43%
LINK $10.08 -4.19%
HYPE $44.08 -2.96%
AAVE $93.00 -5.83%
SUI $1.09 -8.57%
XLM $0.1549 -5.09%
ZEC $514.24 -8.02%
BTC $79,065.78 -2.99%
ETH $2,226.88 -2.79%
BNB $672.50 -1.60%
XRP $1.43 -4.21%
SOL $89.19 -3.45%
TRX $0.3520 -0.39%
DOGE $0.1127 -3.79%
ADA $0.2614 -3.98%
BCH $426.22 -2.43%
LINK $10.08 -4.19%
HYPE $44.08 -2.96%
AAVE $93.00 -5.83%
SUI $1.09 -8.57%
XLM $0.1549 -5.09%
ZEC $514.24 -8.02%

pera

AI Agent Security Risk Exposure: Attackers Can Exploit "Memory Pollution" to Induce Misoperation of Funds

The GoPlus Security team has disclosed a new type of attack in its AgentGuard AI project: inducing AI agents to perform unauthorized sensitive operations through "memory poisoning." This attack method does not rely on traditional vulnerabilities or malicious code but exploits the long-term memory mechanism of AI agents. For example, an attacker first induces the agent to "remember preferences," such as "usually prioritizing proactive refunds instead of waiting for chargebacks," and then uses vague expressions like "process as usual" or "execute as before" in subsequent instructions, thereby triggering automated financial operations.GoPlus points out that the key risk in such cases lies in the AI agent mistakenly treating "historical preferences" as a basis for authorization, leading to financial losses or security incidents in operations such as refunds, transfers, and configuration changes. To address this issue, the team has proposed several protective recommendations, including:Operations involving refunds, transfers, deletions, or sensitive configurations must require explicit confirmation in the current session.Memory-related instructions like "habit," "usual way," and "as before" should be regarded as high-risk state changes.Long-term memory must have a traceability mechanism (writer, time, confirmation status).Vague instructions should automatically elevate the risk level and trigger secondary verification.Long-term memory must not replace real-time authorization processes.The team emphasizes that the "AI agent memory system" should be viewed as a potential attack surface and should be constrained and audited through a dedicated security framework.

Signal hints at or exits Canada, refusing to cooperate with the new surveillance bill

The encrypted messaging app Signal stated that if Canada's Bill C-22 is officially passed and requires platforms to establish "lawful access" monitoring capabilities, the company may choose to exit the Canadian market rather than weaken end-to-end encryption. Signal's Vice President of Strategy and Global Affairs, Udbhav Tiwari, indicated that the bill could force communication services to create technical backdoors, thereby undermining encryption security and making private communications more susceptible to exploitation by hackers and foreign attackers.Bill C-22 was introduced in March 2026 as part of a new round of regulatory measures in Canada, requiring electronic service providers to establish law enforcement monitoring capabilities and retain certain user metadata for up to a year to assist in investigations of crimes such as terrorism and child exploitation. Critics argue that the bill is similar to the EU's previously controversial "chat monitoring" proposal, which could threaten end-to-end encryption and user privacy. Canadian Conservative MP Jacob Mantle stated that nearly all Canadian MPs use Signal precisely because of its privacy and security features, yet the bill could grant the government the ability to read private messages.Tiwari stated, "Signal would rather exit Canada than violate the privacy commitments made to users." In addition to Signal, the VPN provider Windscribe also indicated that if the bill passes in its current form, the company may follow Signal in withdrawing from the Canadian market. Windscribe claimed that the bill could force VPN services to log data that could identify users, violating its core privacy principles.
app_icon
ChainCatcher Building the Web3 world with innovations.