Navigation
Recherche
|
Hacker Slips Malicious 'Wiping' Command Into Amazon's Q AI Coding Assistant
samedi 26 juillet 2025, 15:00 , par Slashdot
![]() If the coding assistant had executed this, it would have erased local files and, if triggered under certain conditions, could have dismantled a company's Amazon Web Services (AWS) cloud infrastructure. The attacker later stated that, while the actual risk of widespread computer wiping was low in practice, their access could have allowed far more serious consequences. The real problem was that this potentially dangerous update had somehow passed Amazon's verification process and was included in a public release of the tool earlier in July. This is unacceptable. Amazon Q is part of AWS's AI developers suite. It's meant to be a transformative tool that enables developers to leverage generative AI in writing, testing, and deploying code more efficiently. This is not the kind of 'transformative' AWS ever wanted in its worst nightmares. In an after-the-fact statement, Amazon said, 'Security is our top priority. We quickly mitigated an attempt to exploit a known issue in two open source repositories to alter code in the Amazon Q Developer extension for VSCode and confirmed that no customer resources were impacted. We have fully mitigated the issue in both repositories.' This was not an open source problem, per se. It was how Amazon had implemented open source. As EricS. Raymond, one of the people behind open source, said in Linus's Law, 'Given enough eyeballs, all bugs are shallow.' If no one is looking, though -- as appears to be the case here — then simply because a codebase is open, it doesn't provide any safety or security at all. Read more of this story at Slashdot.
https://developers.slashdot.org/story/25/07/26/0352242/hacker-slips-malicious-wiping-command-into-am...
Voir aussi |
56 sources (32 en français)
Date Actuelle
dim. 27 juil. - 07:57 CEST
|