'What if the AI agent you just deployed was secretly working against you?': Vertex AI 'double agent' flaw exposes customer data and Google's internal code
Date:
Wed, 01 Apr 2026 15:25:00 +0000
Description:
Misconfigured AI agents can lead to data disclosure and other risks.
FULL STORY
Cloud misconfigurations are
one of the biggest causes of data leaks, but now we have another form of misconfiguration to worry about - AI agents.
Unit 42, Palo Altos cybersecurity arm , has revealed new analysis showing how an AI agent deployed in the Google Cloud Platform (GCP) Vertex AI Agent
Engine can be turned into a double agent - doing nefarious work while
appearing to serve its intended purpose. Vertex AI is the main AI/ML platform from Google Cloud, where developers can build and deploy machine learning models and generative AI apps. The Agent Engine is what turns models into autonomous agents. However, Unit 42 notes that if theyre not careful with permissions, users can leave their agents vulnerable to takeovers.
By exploiting a significant risk in default permission scoping and
compromising a single service agent, we reveal how the Vertex AI permission model can be misused, leading to unintended consequences, the report states.
The researchers first deployed a custom AI agent using Vertex AIs ADK in a controlled environment and then discovered that the agents default service account (P4SA) had excessive permissions.
Then, using a custom-built malicious tool , they were able to extract service agent credentials from the metadata service, and then use those to pivot into the consumer project. This gave them unrestricted read access to all Cloud Storage data, as well as the producer (Google-managed) environment.
This exposed restricted Artifact Registry repositories, allowing the researchers to download private container images, enumerate internal
resources and inspected artifacts, and reveal proprietary source code and internal infrastructure details.
"Gaining access to this proprietary code not only exposes Google's
intellectual property but also provides an attacker with a blueprint to find further vulnerabilities," the researchers explained in the paper.
In response, Google updated its documentation, to better explain how Vertex
AI uses resources, accounts, and agents. The company is now recommending customers use Bring Your Own Service Account (BYOSA) to replace the default ones.
Link to news story:
https://www.techradar.com/pro/security/what-if-the-ai-agent-you-just-deployed- was-secretly-working-against-you-vertex-ai-double-agent-flaw-exposes-customer- data-and-googles-internal-code
$$
--- SBBSecho 3.28-Linux
* Origin: Capitol City Online (1:2320/107)