Exploring Information Security - Exploring Information Security

Exploring the Rogue AI Agent Threat with Sam Chehab


Listen Later

Summary:

In a unique live recording, Timothy De Block is joined by Sam Chehab from Postman to tackle the intersection of AI and API security. The conversation goes beyond the hype of AI-created malware to focus on a more subtle, yet pervasive threat: "rogue AI agents." The speakers define these as sanctioned AI tools that, when misconfigured or given improper permissions, can cause significant havoc by misbehaving and exposing sensitive data. The episode emphasizes that this risk is not new, but an exacerbation of classic hygiene problems.

Key Takeaways
  • Defining "Rogue AI Agents": Sam Chehab defines a "rogue AI agent" as a sanctioned AI tool that misbehaves due to misconfiguration, often exposing data it shouldn't have access to. He likens it to an enterprise search tool in the early 2000s that crawled an intranet and surfaced things it wasn't supposed to.

  • The AI-API Connection: An AI agent is comprised of six components, and the "tool" component is where it interacts with APIs. The speakers note that the AI's APIs are its "arms and legs" and are often where it gets into trouble.

  • The Importance of Security Hygiene: The core of the solution is to "go back to basics" with good hygiene. This includes building APIs with an open API spec, enforcing schemas, and ensuring single-purpose logins for integrations to improve traceability.

  • The Rise of the "Citizen Developer": The conversation highlights a new security vector: non-developers, or "citizen developers," in departments like HR and finance building their own agents using enterprise tools. These individuals often lack security fundamentals, and their workflows are a "ripe area for risk".

  • AI's Role in Development: Sam and Timothy discuss how AI can augment a developer's capabilities, but a human is still needed in the process. The report from Veracode notes that AI-generated code is only secure about 45% of the time, which is about on par with human-written code. The best approach is to use AI to fix specific lines of code in pre-commit, rather than having it write entire applications.

Resources & Links Mentioned
  • Postman State of the API Report: This report, which discusses API trends and security, will be released on October 8th. The speakers tease a follow-up episode to dive into its findings.

  • Veracode: The 2025 GenAI Code Security Report was mentioned in the discussion on AI-generated code.

  • GitGuardian: The State of Secrets Sprawl report was referenced as a key resource.

  • Cloudflare: Mentioned as a service for API shield and monitoring API traffic.

  • News Sites: Sam Chehab recommends Security Affairs, The Hacker News, Cybernews, and Information Security Magazine for staying up-to-date.

Support the Podcast:

Enjoyed this episode? Leave us a review and share it with your network! Subscribe for more insightful discussions on information security and privacy.

Contact Information:

Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn][YouTube]

Subscribe

Sign up with your email address to receive news and updates.

Email Address
Sign Up

We respect your privacy.

Thank you!


...more
View all episodesView all episodes
Download on the App Store

Exploring Information Security - Exploring Information SecurityBy Timothy De Block

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

43 ratings


More shows like Exploring Information Security - Exploring Information Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,002 Listeners

Risky Business by Patrick Gray

Risky Business

376 Listeners

Down the Security Rabbithole Podcast (DtSR) by Rafal (Wh1t3Rabbit) Los

Down the Security Rabbithole Podcast (DtSR)

98 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

651 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,021 Listeners

The Daily by The New York Times

The Daily

112,597 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,011 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

177 Listeners

Behind the Money by Financial Times

Behind the Money

227 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Hacker Valley Studio by Hacker Valley Media

Hacker Valley Studio

60 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

136 Listeners

Hard Fork by The New York Times

Hard Fork

5,470 Listeners

The President's Daily Brief by The First TV

The President's Daily Brief

3,354 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

46 Listeners