Claude Cowork Vulnerability Allows Unauthorized Data Exfiltration
- •Security researchers at Prompt Armor identified a critical data exfiltration vulnerability in Anthropic’s new Claude Cowork AI agent.
- •The exploit utilizes prompt injection to bypass domain restrictions by uploading sensitive user files directly to Anthropic’s own trusted API infrastructure.
- •This security flaw highlights the complex risks associated with agentic AI systems that possess autonomous access to private local data.
Simon Willison, a software engineer and influential AI blogger, recently highlighted a major security vulnerability within Claude Cowork, a general-purpose AI agent developed by Anthropic. Researchers at Prompt Armor discovered that the system is susceptible to data exfiltration, a process where sensitive information is secretly moved out of a secure environment. Although the agent implements safety measures to restrict outbound web traffic to a whitelist of approved domains, attackers found a way to manipulate these internal controls by using the system's own trusted infrastructure.
The attack mechanism relies on prompt injection, where malicious instructions are embedded within a user's input to override the AI's intended behavior. By exploiting the fact that Anthropic’s own API domain is considered a trusted destination, researchers provided the agent with a personal API key and instructed it to upload local user files to Anthropic’s file-hosting endpoint. This allows an unauthorized party to retrieve stolen data later via their own account, effectively bypassing the sandbox protections designed to maintain data privacy.
This incident highlights the significant security challenges inherent in agentic AI, which refers to autonomous systems capable of interacting with local files and external tools. Even with strict domain restrictions, the sophisticated nature of AI agents makes them vulnerable to creative workarounds that leverage their own infrastructure. As these autonomous tools are integrated into professional workflows, ensuring they cannot be tricked into leaking sensitive information remains a critical priority for developers and security professionals.