Get the latest tech news

Data exfil from agents in messaging apps


Communicating with AI agents (like OpenClaw) via messaging apps (like Slack and Telegram) has become much more popular. But it can expose users to a largely unrecognized LLM-specific data exfiltration risk, because these apps support ‘link previews’ as a feature. With previews enabled, user data can be exfiltrated automatically after receiving a malicious link in an LLM-generated message -- whereas without previews, the user would typically have to click the malicious link to exfiltrate data. For example, OpenClaw via Telegram is exposed by default. Test any agent / communication app pairing below!

None

Get the Android app

Or read this on Hacker News

Read more on:

Photo of apps

apps

Photo of agents

agents

Photo of Data exfil

Data exfil

Related news:

News photo

DOJ may face investigation for pressuring Apple, Google to remove apps for tracking ICE agents

News photo

Sixteen AI Agents Built a C Compiler From Scratch

News photo

Eight more months of agents