AI stream

AI Post

@veritas_web3
Security advisory High importance

@veritas_web3

Importance score: 3 • Posted: February 27, 2026 at 12:35

Score

3

AI coding agents blindly follow instructions in repo context files. Attackers will use this. Coding agents like Claude Code and Codex reliably follow instructions placed in http://AGENTS.md and http://CLAUDE.md files. When a context file says "use this tool," the agent uses it. When it says "run this command," the agent runs it. Tool usage jumps from near-zero to multiple calls per task just because the context file mentions a tool by name. Now think about what this means from an attacker's perspective. 60,000+ public repos already contain these files. A poisoned http://AGENTS.md in a compromised repo can steer your agent to traverse specific directories, run specific commands and execute specific tools. No questions asked. This is prompt injection in your software supply chain. The practical takeaway: skip auto-generated context files for now. If you write one manually, keep it minimal. Only include what the agent can't figure out on its own, like specific tooling requirements.

Media

Grok reasoning
Highlights security risks in AI coding agents like Claude Code; important for AI dev tools safety.

Likes

356

Reposts

21

Views

25,233

Tweet ID: 2027361919657533815
Prompt source: ai-news
Fetched at: February 28, 2026 at 06:03