惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Google DeepMind News
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
爱范儿
爱范儿
WordPress大学
WordPress大学
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
美团技术团队
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
MyScale Blog
D
Docker
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
AWS News Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
NISL@THU
The Register - Security
The Register - Security
Recent Commits to openclaw:main
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA

Forbes - Innovation

2026 America Innovates | Responsible For All Our Digital Maps, Jack Dangermond Loves The Word 'Where' 2026 America Innovates | Fracking Pioneer Harold Hamm Calls Oil And Gas The Most Reliable Energy For AI Why Tom Hardy Was Reportedly Just Fired From ‘Mobland’ Season 3 How Small Studios Outrun Bigger Teams Sony Launches Reon Pocket Pro Plus Wearable Air Conditioner In Time For Summer Heatwaves Industry 5.0 Is Changing The Meaning Of Automation Garmin Watches, Coros And More Now Pair Better With Strava NYT Connections Hints Today: Saturday, May 23 Groups And Answers (#1077) The Architectural Difference Between Legal Productivity AI And EDiscovery AI ‘The Mandalorian And Grogu’ Sets A Rotten Tomatoes Audience Score Record How AI Tools Are Redefining The Role Of Technical Founders Apple Spotlights Student Entrepreneurs In Great Ideas Start Here Campaign The Growing Cybersecurity Risks To The Supply Chain In The AI Era Your Website Is Decaying Consumer Intent Faster Than You Think With ‘Destiny 2’ Gone, No ‘Destiny 3’ Is Coming ​How Operational Access Can Ensure Readiness For The Next Storm Why Russians Are In Despair Over Truck-Busting ’Martian’ Drones New ‘Crimson Desert’ Patch Adds Another Long-Time Player Request The Architecture Behind Cost-Effective AI Agents How To Think About High-Stakes Dispute Resolution Why Do Our Fingers Get Wrinkly In Water? An Evolutionary Biologist Explains You Can Build A CRM In A Day. You Still Can't Run A Company In One. 6 Teachable Moments From An Atlanta Rush Hour Downpour Why Your AI-Generated Marketing Content Sounds Generic ​The Accountability Crisis In The Creator Economy Scaling Across Borders: What It Takes To Succeed Globally Apple Rolls Out Two Crucial Health Features For Apple Watch And AirPods In India Competitive Advantage In Logistics Isn't AI ​Why AI Can Write Code, But It Can't Teach Engineers Critical Thinking The Importance Of Red Teaming For Scaling Enterprise AI Agents Why The Next AI Moat Won’t Be Productivity, But Emotional Value Banking’s AI Problem Isn’t The Model. It’s The Plumbing The Case For Structural Reform Through Tokenization SpaceX Scrubs Starship Launch As $2 Trillion IPO Nears LEGO F1 Ferrari Helmet Review (43014): Rough Build, Spectacular Finish Oleksandr Usyk Vs. Rico Verhoeven: Date, Time And How To Watch If Majoring In Computer Science Is Doomed Due To AI, The Latest Claim Is That Majoring In Philosophy Is The Next Best Choice MVP's Nakisa Bidarian On Rousey-Carano Viewership, Shields' Ban And PFL Co-Promotion See A ‘Planet Parade’ As Three Worlds Shine After Sunset This Weekend Soundcore’s Liberty 5 Are First Earbuds To Use Anker’s Thus AI Chip Code Ninjas: The AI-In-Education Problem Isn’t Cheating. It’s Passivity. Today’s Wordle #1798 Hints And Answer For Friday, May 22 NYT ‘Pips’ Hints, Answers And Walkthrough For Friday, May 22 Apple Teases iOS 27 AI Upgrades With Major Accessibility Overhaul To iPhone Samsung Releases Free One UI 8.5 Upgrade To Millions Of Galaxy Phones How Instagram Became A Venture Capital Deal Engine ‘Star Wars: The Mandalorian And Grogu’: Which Movie Is Best? New Study: A Quarter Of College Students Using AI Daily Cheat With It NYT Connections Answers Explained Friday May 22 NYT Connections Hints Today: Friday, May 22 Clues And Answers (#1,076) NYT Strands Hint Today: Friday, May 22 Clues And Answers (Put Down Your Ruler) Quordle Hints Today: Friday, May 22 Clues And Answers Webb Telescope Detects Cloudy Mornings And Clear Nights On Alien World AI Flattening Organizations Is The Latest Chapter In A Continuing Story AI Was Supposed To Reduce Your Workload. Here’s Why It Hasn’t, And Here’s How It Can. DevOps Practices Tech Teams Must Strengthen In The AI Era The End Of ‘Destiny 2’: All Expansions Canceled, Maintenance Mode Incoming ‘The Mandalorian And Grogu’ Recap Before You See The Movie, Post-Credits Scene And More Fidelity Collective Buys Up Westone Audio And Etymotic Brands Why AI Profitability Belongs To Enterprise, Not Consumer Scale OpenAI And Anthropic Are Testing Two Very Different AI Business Models Kordata Launches To Advance Neurotech-Powered Clinical Trials Solving The Identity Crisis: Putting Today’s Fragmented Consumer Back Together These Are The Most- And Least-Expensive New Cars To Run At Today’s Fuel Prices New Reports And New Paradigms Show Drive In AI Smart Glasses Market Samsung Galaxy Z Fold 8: Price Rise, Bad Crease News Anthropic And Microsoft Team Up Why Nvidia Needs More Than GPUs To Win The AI Infrastructure Race Nvidia Is Expanding Infra Partnerships. Will A Big Deal Happen? Drug Overdose Deaths Fell in 2024. Why Experts Remain Cautious Microsoft Is Scrapping SMS 2FA Codes—What You Need To Do ‘Wax Heads’ Review: Somehow The Vital Connection Is Made Securing The Internet’s Humanity Netflix’s Best New Show Lands A Perfect Rotten Tomatoes Score As A Final Duffer Bros. Effort AI Might Not Bring On A Job Crisis, But A Workforce ‘Mismatch’ Could Why Post-Quantum Compliance For Banks Starts In Containers Do Your AI Agents Have Governance? Most Don’t, And They’re Live Why Complexity Is The Insider Threat Hiding In Plain Sight ‘Supergirl’ Is Starting To Feel Like It May Be A Big DCU Miss Google Confirms 2 Critical New Flaws—How To Jump The Update Queue Google Splits Its Agent Strategy For Two Developer Audiences Rethinking GRC In The Tokenized Economy ‘The Boys’ Series Finale Review Scores Are Way Under ‘Stranger Things’ Autonomous Data Stewardship: How AI Agents Are Redefining Master Data Management In Financial Services Why Performance Has Become The New Currency In Advertising The Plan For FEMA Reform, Less People In D.C.,More Responsibility For States A Small Business Guide To Understanding Multistate Tax Obligations There’s A Way ‘Gen V’ May Now Live On After ‘The Boys’ Finale Garmin Cirqa Price May Be Far Higher Than Expected Securing AI Cloud Systems: Intelligent Testing For Intelligent Systems 2 New Microsoft Defender Zero-Days Exploited—Patch Now Rolling Out 2 Tell-Tale Signs Of ‘Fake Love’ In A Relationship, By A Psychologist Of All The Professions AI Is Disrupting, Accounting Has The Worst Math California Lets Cops Give Tickets To Robocars, Which Is Ridiculous Why Do Humans Have Unique Voices? An Evolutionary Biologist Explains The Anatomy That Makes You Unmistakable How Connected Reporting And Dynamic Waterfalls Reshape Fund Services The New Resilience Part 2: Evolving Best Practices In AI And IIoT Humanoid’s New Deal: Bosch Will Build Its Robots With Schaeffler Parts ​How AI Is Changing The Economics Of Integration ​Why The Cheapest AI Stack Becomes The Most Expensive At Scale
What To Do When Your AI Agents Have Permissions You Never Approved
Vineet Arora · 2026-05-14 · via Forbes - Innovation

Vineet Arora, CTO & Co-Founder, WinWire, with 30+ years in IT Consulting helping CxOs drive Business Transformation thru AgenticAI Solutions

AI agent robot

getty

Gartner’s latest projection puts it plainly: "By 2028, 25% of all enterprise generative AI (GenAI) applications will experience at least five minor security incidents per year, up from 9% in 2025​." And by 2029, 15% will face at least one major incident, up from 3% in 2025. Numbers like that land differently when you have seen what an incident looks like.

​Last year, researchers at Aim Labs disclosed EchoLeak, a zero-click vulnerability in Microsoft 365 Copilot. A crafted email, without links or attachments, could cause the agent to follow hidden instructions and expose sensitive data within its access scope. Microsoft patched the issue before any known real-world exploitation.

​A few months later, Noma Labs disclosed ForcedLeak, a critical vulnerability in Salesforce Agentforce, where malicious instructions embedded in Web-to-Lead form fields could be executed by AI agents, enabling the exfiltration of sensitive CRM data.​

In both cases, the defenders got lucky that the researchers found the flaw first.

The second category of incident is already live in production. In developer tooling, there are emerging reports of agent misexecution. For example, a documented issue involving Google’s Gemini CLI describes unintended file operations that resulted in data loss, with the system later acknowledging failure. In another widely reported incident, an AI coding agent from Replit deleted a production database during a development workflow, prompting a public apology from the company’s CEO.​

The OWASP Foundation responded by releasing its first Top 10 for Agentic Applications, cataloging the 10 highest-impact threats specific to autonomous AI systems. It reads less like a traditional vulnerability report and more like a reckoning with what happens when software can plan, decide and act on our behalf without anyone rethinking how we secure it.

I spend most of my time working with enterprises that are building and governing agentic systems. The question I get asked most often is whether existing security tools can handle this. Traditional controls were designed to catch bad actors, not well-intentioned systems operating beyond their intended scope. If the risk lives in permissions, memory, tools and what agents decide to do on their own, security must be part of how the thing gets built.

How Platform Design Shapes Agent Risk

Each of the 10 OWASP risks maps to a design constraint that either exists before the agent ever reaches production or does not. That distinction separates the agents that should be deployed.

Start with what the agent can reach. Agents should be built from predefined actions, vetted connectors and scoped capabilities, not assembled from an open plugin marketplace where an unvetted component enters the execution chain. Administrators govern which connectors are available. Custom logic runs in sandboxed environments. That single design decision addresses unexpected code execution (ASI05), tool misuse and exploitation (ASI02) and agentic supply chain vulnerability (ASI04) through architecture, rather than through policy documents sitting in a SharePoint folder nobody reads.

Identity is where most agentic deployments get it wrong. I have watched it happen. An agent that inherits a service account’s broad permissions can access anything that account touches. The better pattern is for agents to operate under the end user’s directory permissions by default, so a compromised agent can only access what that specific user can access. That constraint limits the blast radius of agent goal hijack (ASI01) and identity and privilege abuse (ASI03) before anyone writes a security policy.

Memory is the other risk, one that rarely surfaces in procurement conversations. Agents that retain context across sessions give attackers a persistent foothold. If session memory does not carry over between conversations and there is no shared global memory store, memory and context poisoning (ASI06) has nowhere to live.

Multiagent connections should require explicit configuration rather than automatic trust inheritance, which closes the door on insecure inter-agent communication (ASI07) by default, not by exception.

Containment handles what is left. Agents that cannot rewrite their own logic without going through a full republish cycle are the structural answer to rogue agents (ASI10). Monitoring and quotas function as circuit breakers against cascading failures (ASI08). For the highest-stakes actions, human-in-the-loop configurations require explicit confirmation before execution. That is not a feature toggle. It is the only reliable defense against the kind of human-agent trust exploitation (ASI09) that lets a finance manager approve a fraudulent payment because the copilot said it was urgent.

Architecture only gets you halfway. A well-designed agent still needs watching once it hits production. Good design reduces risk at the start. Visibility is what catches the risk that accumulates after.

Bridging The Governance Gap

At one enterprise we recently worked with, the finance, sales and customer experience teams had each deployed AI agents independently: different tools, no shared governance and no audit trail connecting any of them. The fix was unglamorous. It involved a tenant-wide control plane with role-based access, centralized policy enforcement and audit logging that worked across every agent regardless of how it was built or who built it. For the first time, leadership had a single view of agent activity across the business, and IT could answer the question, “How many agents do we have?”

A control plane of that kind is now emerging across the major enterprise platforms. Whether you standardize on one vendor’s fleet-management layer or build a multi-platform inventory yourself, the requirement is the same. You need a single place to observe, govern and secure every agent in the tenant, with detailed logging, risk reporting and audit trails across the entire fleet.

The Question Before The Question

The OWASP Agentic Top 10 makes something clear that the industry has been slow to acknowledge: Agents amplify existing vulnerabilities. The document’s authors put it directly: "Deploying agentic behavior where it is not needed expands the attack surface without adding value." They call it the principle of "least agency."

The conversation about agentic security should not start with which threats to mitigate. It should start with whether you need an agent at all and, if you do, whether the platform you are building on treats security as part of the architecture or as an afterthought. That is the question worth answering before the next deployment, not after the first incident.


Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?