aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingSunday, May 17, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 158/371
VIEW ALL
01

CVE-2026-28451: OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that al

security
Mar 5, 2026

OpenClaw versions before 2026.2.14 have a server-side request forgery vulnerability (SSRF, where an attacker tricks a server into making requests to unintended targets) in the Feishu extension that allows attackers to fetch remote URLs and access internal services through the sendMediaFeishu function and markdown image processing. Attackers can exploit this by manipulating tool calls or using prompt injection (tricking the AI by hiding instructions in its input) to trigger these requests and re-upload the responses as Feishu media.

Fix: Upgrade OpenClaw to version 2026.2.14 or later.

NVD/CVE Database
02

Anthropic labelled a supply chain risk by Pentagon

policyindustry
Mar 5, 2026

The US Pentagon has officially labeled Anthropic, an AI company, as a supply chain risk, marking the first time the government has given this designation to a US firm. This decision stems from Anthropic's refusal to give the military unrestricted access to its AI tools, citing concerns about mass surveillance and autonomous weapons development. The designation prohibits any company working with the military from conducting business with Anthropic.

BBC Technology
03

GHSA-jc5m-wrp2-qq38: Flowise Vulnerable to PII Disclosure on Unauthenticated Forgot Password Endpoint

security
Mar 5, 2026

Flowise's forgot-password endpoint leaks personally identifiable information (PII: sensitive data like names and account IDs that identify individuals) to anyone who knows a valid email address, because it returns the full user object instead of a generic success message. An attacker can exploit this by sending a simple request to `/api/v1/account/forgot-password` with any email address and receive back user IDs, names, creation dates, and other account details without needing to log in.

GitHub Advisory Database
04

AWS launches a new AI agent platform specifically for healthcare

industry
Mar 5, 2026

AWS launched Amazon Connect Health, an AI agent-powered platform (software that completes complex tasks automatically) designed to help healthcare organizations automate administrative work like appointment scheduling and patient records. The platform is HIPAA-eligible (meets healthcare privacy and security standards) and integrates with existing electronic health record systems, marking AWS's first major AI agent product in a regulatory-compliant healthcare offering.

TechCrunch
05

GHSA-x2g5-fvc2-gqvp: Flowise has Insufficient Password Salt Rounds

security
Mar 5, 2026

Flowise uses an insufficiently weak password hashing setting where bcrypt (a password encryption algorithm) is configured with only 5 salt rounds, which provides just 32 iterations compared to OWASP's recommended minimum of 10 rounds (1024 iterations). This weakness means that if a database is stolen, attackers can crack user passwords roughly 30 times faster using modern GPUs, putting all user accounts at risk.

Fix: The source recommends increasing the default PASSWORD_SALT_HASH_ROUNDS environment variable to at least 10 (as recommended by OWASP), or considering 12 for a better balance between security and login performance. The source also recommends documenting that higher values will increase login time but improve security. Note: the source acknowledges that existing password hashes created with 5 rounds will remain vulnerable even after this change is applied.

GitHub Advisory Database
06

CVE-2026-0848: NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegment

security
Mar 5, 2026

NLTK (Natural Language Toolkit, a Python library for text processing) versions 3.9.2 and earlier have a serious vulnerability in the StanfordSegmenter module, which loads external Java files without checking if they are legitimate. An attacker can trick the system into running malicious code by providing a fake Java file, which executes when the module loads, potentially giving them full control over the system.

NVD/CVE Database
07

It’s official: The Pentagon has labeled Anthropic a supply-chain risk

policyindustry
Mar 5, 2026

The U.S. Department of Defense has officially designated Anthropic, an AI company, as a supply-chain risk (a classification usually reserved for foreign adversaries), requiring any organization working with the Pentagon to certify it doesn't use Anthropic's products. This designation came after Anthropic CEO Dario Amodei refused to allow the military to use the company's AI systems for mass surveillance of Americans or to power fully autonomous weapons with no human involvement in targeting decisions. The move is threatening Anthropic's operations, especially since the military currently relies on Anthropic's Claude AI for operations in the Middle East and other classified work.

TechCrunch
08

GHSA-g48c-2wqr-h844: LangGraph checkpoint loading has unsafe msgpack deserialization

security
Mar 5, 2026

LangGraph has a vulnerability where checkpoints stored using msgpack (a serialization format for encoding data) can be unsafe if an attacker gains write access to the checkpoint storage (like a database). When the application loads a checkpoint, unsafe code could be executed if an attacker crafted a malicious payload. This is a post-compromise risk that requires the attacker to already have privileged access to the storage system.

Fix: LangGraph provides several mitigation options: (1) Set the environment variable `LANGGRAPH_STRICT_MSGPACK` to a truthy value (`1`, `true`, or `yes`) to enable strict mode, which blocks unsafe object types by default. (2) Configure `allowed_msgpack_modules` in your serializer or checkpointer to `None` (strict mode, only safe types allowed), a custom allowlist of specific modules and classes like `[(module, class_name), ...]`, or `True` (the default, allows all types but logs warnings). (3) When compiling a `StateGraph` with `LANGGRAPH_STRICT_MSGPACK` enabled, LangGraph automatically derives an allowlist from the graph's schemas and channels and applies it to the checkpointer.

GitHub Advisory Database
09

CVE-2026-28353: Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.

security
Mar 5, 2026

Trivy VSCode Extension version 1.8.12 (a tool that scans code for security weaknesses) was compromised with malicious code that could steal sensitive information by using local AI coding agents (AI tools running on a developer's computer). The malicious version has been removed from the marketplace where it was distributed.

Fix: Users are advised to immediately remove the affected artifact and rotate environment secrets (credentials and keys stored on their system).

NVD/CVE Database
10

OpenAI's Altman takes jabs at Anthropic, says government should be more powerful than companies

policyindustry
Mar 5, 2026

This article covers a public dispute between AI company leaders Sam Altman (OpenAI) and Dario Amodei (Anthropic) regarding government power and company influence, along with a conflict between Anthropic and the U.S. Department of Defense that resulted in the Pentagon blacklisting Anthropic's AI models and directing federal agencies to stop using them. OpenAI subsequently announced its own agreement with the Department of Defense, which drew criticism for appearing opportunistic, though Altman stated the company intended to de-escalate the situation.

CNBC Technology
Prev1...156157158159160...371Next