Docker’s Ask Gordon AI flaw lets image metadata trigger remote code execution and data theft
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
VS Code repository configs can trigger executable actions in GitHub Codespaces
Orca Security says repository-defined Visual Studio Code settings used by GitHub Codespaces can be applied automatically and carry executable commands or terminal variables that run without explicit user approval, creating a vector for token theft and supply-chain abuse. Recent extension‑supply‑chain incidents (including poisoned VS Code extensions and resilient off‑platform command channels) show attackers are diversifying delivery and control mechanisms, meaning repo configs are an additional, potent trust boundary to defend.
Security flaws in popular open-source AI assistant expose credentials and private chats
Researchers discovered that internet-accessible instances of the open-source assistant Clawdbot can leak sensitive credentials and conversation histories when misconfigured. The exposure enables attackers to harvest API keys, impersonate users, and in one test led to extracting a private cryptographic key within minutes.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.

