<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Lakera Bulletin - This Week in AI #43: When Agents Break Things in AI Agents Security</title>
    <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-43-When-Agents-Break-Things/m-p/270139#M56</link>
    <description>&lt;P&gt;Another great one.&lt;/P&gt;</description>
    <pubDate>Tue, 10 Feb 2026 02:49:11 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-02-10T02:49:11Z</dc:date>
    <item>
      <title>Lakera Bulletin - This Week in AI #43: When Agents Break Things</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-43-When-Agents-Break-Things/m-p/270039#M55</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This week’s AI news is a sharp mix of capability and caution:&amp;nbsp;from a newly released Claude model uncovering real-world security flaws, to fresh warnings about agent ecosystems being abused in the wild. We also close with two Lakera deep dives on what happens when agentic systems act with human authority.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let’s get into it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Claude Opus 4.6 Emerges as a Security Powerhouse&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Anthropic has released &lt;STRONG&gt;Claude Opus 4.6&lt;/STRONG&gt;, a new version of its flagship model that’s already making waves in security research. Early testing shows it &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwRY3qn9qW95jsWP6lZ3nVVcgCjn1yFP4SW8XfkP261pTPwW2jjzN_11TzvVW8mtb3B8kdgj7W8yt2SY810zc-W3-Dqd-5SWQQhW2Tk97N3PmSysMbnmVlWt_PBVrVzjj4y4-J0W87wfr45RbjnvW8r81Gl3sf4KyVdx-F44jJmFpW4Z2cNB7HsqqWW2jWl0K2BhXM8W7rjdh495X-K3W2MJ5Mh2k4NC8W1Pr28k3SdFtfW5y-mxL1ynthCW3GDvcX4k_jnRVj3t938dNGFBW709Cs38M2ySNW3_0Wns1jkZncW16TTbM269jbrN8GLCW6q331mW6G4vJF62Y5W2W3xXy4W5CHZNCN7DZpWt7Npy2W6W15wY4pHrB-W37hb4C38sPzPW4txGkV1PRDrgf3gPGXg04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="Bsuhlddh"&gt;uncovering hundreds of previously unknown vulnerabilities&lt;/A&gt; in open-source software, raising the bar for AI-assisted bug hunting.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwPT5nXHCW50kH_H6lZ3pJW4WXDcX7kl6tkW2Mw-lG8ZlbyLVwZ1Lc7jcfmlW3D_JRH2m5xjdW5hw_Cn81H5VdW7t-JB5740B17W3k4sGG61qkmRW7dhwlx5DSHs6N2xPChfb4QBqW255_4278rZmwW9dKc3-7SRWhrW2S3q5w4SySTRW1D-w551ybxvtW5wPrk182yclNW3rjBxj2p6m3NW5gkZ-T5M6Lh7W5gDCC6290x8hN1cJZlW31xztVCDRB08C58TCW83fCdc1zX4RdW3ZZ0v35NCLf8W254ZMk3wfXf0W14vN678NSClxW2NY0-07g2rC9W8R8v7023z1PnV2Q4f5838CnzW1fyQJx7VnHTzW5Y996_3wxXdLW6ZZqc696m3GsW4z0dLP2hqdMZN2dqbkg2YkVtW2FjcYl8Y_7DqdFPGs-04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="befY8OlZ"&gt;Read the DevOps.com analysis&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;China Warns of Security Risks Linked to OpenClaw AI Agents&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Chinese regulators issued a public warning about security risks tied to the fast-growing OpenClaw agent ecosystem. The notice highlights concerns around misconfigurations, excessive permissions, and the potential for agent abuse at scale.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwQM5nXHCW6N1X8z6lZ3mhW3xB1PQ2w8vZ3N7ZjGjQ-mSqnW6WQMbv276W6VW8k0Bbd8W4PkMW1ZVdMX4Kq4vxW5Z-l1N4szZH6W8JcXwx32zZsRN1W9wzyXBNllW8r4ZQw6nhxjBW4yPslh2fb99FW67QChz8NWNqdW1Xh-4V2B23KGN6mTzDXmrGs1W4pRqL95dgZ4VW8rtwSP1xplXDW8f0ZmL6MpxPwW1j4_kX6_5YgJW38cXnD5S4QgGW89yy552-kRmvW54QbH2945WrQW4My1ZR2HXXMCMCp4gPhQlvFW2zxgLN16F44jW6zDZZw86cjJ6W35wbLR3k5q08W2g_C3V8fxnFMW2GpvPg6cc_VpW3XhGt_603QJmW3jDftr68jLbGW6J1vB24ltMjjW1JQrC95YDFzsW1VX9jM5-sJcJW4cjFg81fLLFmW2cSQpz92zPgRN16-cXMMtdrRW69N6QQ226mkwW95lj2c388WQVW4wFZ2w6hdftJf8sHqjM04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="qadlnnQL"&gt;Read the Reuters report&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Malicious OpenClaw Skills Target Crypto Users&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Researchers uncovered multiple malicious “skills” uploaded to ClawHub, posing as crypto tools for OpenClaw agents. The incident shows how agent marketplaces can quickly become a new supply-chain attack surface.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwPT5nXHCW50kH_H6lZ3p_W6M0wQ51GyM3zW13JSlT7S49SRW7xDX8z43mFfTVCzTgb98mW9lW6lBGZQ2pz8_SW80Cmx35mgFRLW24B-zD6HbbZXW6yCGR83snT8xW774FfD77-vzPW8XFStn3hJjDpN4K_NyDcXh6pV49zdm2cDkBcVFGvTD3x6N0NVtj01r4Z748jW1wsHTl5CnsXjN98Bn4ZpGph_VLKctq8GhmGxW41chfp3bSKZlW759dd77nmkWLW53G1nJ2n-Tp3W5dzm0y8JlG3-W1Z7DX41rzx8dVDtSR_73zmBsW5PRkFk8s3Jh4W5HkvSd48Fw-7W3phHDR2STYXqW17wffq53JcGjW1GC0cB1Xjbw9N5Ky6pGYsdlHN2_vvl9cKLYJW7YkD_g8YtsyyW9lbRF576ddcSf25MJqs04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="JayxuM1b"&gt;Read the&amp;nbsp;investigation&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Moltbook Breach Exposes Emails and Private Messages&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;A security misconfiguration allowed researchers to access tens of thousands of email addresses and private messages from Moltbook, a social network built around AI agents. The breach underscores how immature infrastructure can amplify risk in new AI-native platforms.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwRF5nXHCW8wM7ks6lZ3pWW6CQBFG7_hWgRW7Vw1wD5yTjt2W4pqV6z31TPYYW3JtGBf3Q6x6yW62M6B05c47YFN2-THpBzh2rfW7X0XBC2_vYpxW4LWbjb8sv9tpW5j2yCJ2qns_rW6YBcgl8xZbZfW2zw5Bv1d6Gg1W7CRlCF2TXPB7W7Ghm0-2GRdYzVQxDjK5s_PSCW1bJJPG7BmQ4_W6YWhqT2C-FtzW4w5nnR1c2LwBN21pFbjSd-KFVRYh9g7FDbGTW14M9Gb2RwGKFW2Lnr5k2M1gWkMcDVsyr4WtQW1MfKWP7J31X6W1CccQ94_rBzDW6-KDkk8xmj9-Vy0PgY5Mnt4GW1R_vjL4blCzlW42QytX4YKjV3W11sjVj60qdWSVb3kQ27sLNKxW5Mlp6L5LqbM_W78LKrK1xQFtwW5mQXkP4T1QMcW80n4VK7Xj7vGW3z2xH73vJ8X4W2dY38T5Kvxv_W4hRYbf2jbQjSW7bxTfd4Bh-GnW7WG2Td4XyDm_W44R9Zh2G4xwBW7QT6V71lb24HN14hMbz1Y5wvN8zdXn-HwfYjW7HblxT5LwYJ2f6MlgDF04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="KqlayD3J"&gt;Read the coverage&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Humans, Not Bots,&amp;nbsp;Are Driving Moltbook’s Viral Content&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Despite Moltbook’s pitch as a network for autonomous agents, reporting shows that much of its viral content is still shaped by human prompting and intervention. The platform blurs the line between human and agent activity, raising questions about how autonomous these systems really are,&amp;nbsp;and who’s actually in control.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwQM5nXHCW6N1X8z6lZ3kVN7VhMdrth-04W8kGQ031gj6WhW8wSwN17HdbSjW2463SG4Pf5GbN18rRf5m9_srW5WFs3c5Ssg7QN5YWLZ06nSYSW8xScSb5PYwkKW31gtjC1DwVCYW3Qx1fT8vY2r6Vs8-VZ7llp1-W1P5_HN7jT0SFW8cT9qC6dWB0cW7YLjwq7M6G41W2MkvGz7-gpSqW2Ksk2-6mH9RjW6DtVlh52t4QCW1pTH6x3q5HZsW9lT3jl1-R2BrW6LZ2Xt8nGg9nW5bN10Q2-Ct96W4VR4hv8hkVpgW1NV2M14J-744W7Md-K851dgGMW4s6mK81glRMvW8C0vJ88QmN2FVRr3-j23hkPrW4zWMsK7NLYjSW4txg8M2Jnw4SW2J2VP_7H34HKW8mLxjp1s_QJBW6Y3ldJ3hVlMYW6S2JhK4qCQPNW1b0XBn5KgW4cW2ZZsk33LCnVKW6XJxH736-VMYW940kC27YKW1SV7rYnX8y6kWtf7SsDn-04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="OC1sBwRC"&gt;Read the explainer&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;OpenAI Introduces GPT-5.3-Codex&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;OpenAI has introduced GPT-5.3-Codex, its latest coding-focused model, with improvements in speed, reasoning, and agentic task execution. The release continues the rapid iteration of AI systems designed to operate with increasing autonomy.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwRY3qn9qW95jsWP6lZ3lkW80MYVP6H0PKcW2QTzbG3jxNPxW2c0DsP24_j6PW4d0zs070btRhN1Wjb2tdx17NW125fyj349HKhW5Z63vQ266llbW14CPjQ4vl23TW4tw90L4blCtnW4JV9Qs3j7NszN52xfk-4TGYpW47N1Sz2VtSKhVjGNnm3TcD0XW90QrzS855rmsW37Km3_7kD-HrMv3FHRhb0ZhVQmXj-8xFqQ4VTpztJ893Z2KW6nqns72xn9FtW6TtpXh6_rlzPW2WQSpJ7Fq-m3N3g7s_ZYqGkHN5m7fSbHBws2W6jhKGQ67g8cKW7XNbhq5w9VY2VSh9pg4ygzMbW7sKD0S1YS27cW1nhQ6g4g1wq4W7MJf5l3Q8NNvW8bcJB46BmMwSf8FnpCd04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="BoaD8fQl"&gt;Read the OpenAI announcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Critical Security Bugs Hit n8n Automation Tool&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Newly disclosed vulnerabilities in the popular automation platform n8n can allow attackers to hijack servers and steal credentials,&amp;nbsp;even after earlier fixes. It’s a reminder that automation and agent tooling can quietly become high-impact attack vectors.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwPT5nXHCW50kH_H6lZ3l1W38pWbg73-Cf-W3fYGXS4rhrj-V1gX4023kWrWW2kHfPP3t7bzGW1GTSVN97vMxLW88RWG-6G2HxwW3Tp4vQ1BNpGKW7JrMRk2n8JLcW1NxDLx3xsrFXW48-vXq6P-hs5W4FVJGk1FMTcVVCqTMV5fPhXjW9292tq5Pp3WFW1cc8Sy3Jb0gvW3qn7yP2mT0LBW3d_hCz2YW4y6W3QZGPz8zpwcmW2L0pMV52xgSGW6cLgSM57BL-0W6rYYMy1JjPSQW1tpggY3Ms7pcVHt8kr13PksbW3b30vG6cS99MW2skMRL7CS0TzW3jKZD-6YPV5xW3CQPJG45Zz82W5vVsK27pCb1LW5YR_QD58r6WpW3StfLB612gvZW3zRCKL4KW7DdW44PbJN2SPvtbW94_BqQ1vHsHTf8Cr-GK04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="hH9jukms"&gt;Read The Register’s report&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;In case you missed it,&amp;nbsp;from Lakera&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;We also published two new pieces digging deeper into agentic risk and security:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Red Teaming Agentic Capabilities in NVIDIA NeMo Agent Toolkit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwQ85nXHCW5BWr2F6lZ3nVW18YG1N99_BRrW4wvNmt2hvTtKW6b8WV23v4gvhW5k8-lk2jwb3DW4vy0qD7S4vmYW5LXyjm423xFpW8lNRDq8bl5BDN55h12xz-JnZW55h2jl3XnnTZW3V2N9K3qhBQzN6V3k02n3nb-W6crbbv7pnwFqW8-Hp-26VLlPkW5xsTd61rWXzbW6B0PK32PLD5VW5fkd-z4q0rVYW24gHnW81fVRlW3rjD8P5Mvy8zW4KXCh58RmXqpW3JVxsr9m41YtW7KGlB98hZsQtW3SDpH21Yr3V0W601pyt69zbNGT9rN75b5VdlN2dRNDP1fRqHW2Gv8NX31bdcsW8rQ72R7gY5ZPVFLgF86h66NVW5J1lY71pDb7kW5XrfGg82qGQVW2sX9dS4zV6LqN3HMxV1HsfzHW2qlwPP4Ngy_RW3w8Hcf5vmHQyf7l6WCW04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="TJCbm2J5"&gt;Read the blog post&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;OpenClaw Shows What Happens When AI Agents Act on Human Authority&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://d31-0l04.eu1.hubspotlinks.com/Ctc/L0+113/d31-0L04/VXdB6J4f5QHwW7SKdD87bXWhzW15bp5B5Kd30sM3ZwQs5nXHCW69t95C6lZ3p-W15gYw43mK4L6W8HMGbQ7P33hjW2Xngmn4jPP4kW2TbLBy3Z9xb2W1KNhdS6qrtvJW3x3DKY53pm_SW1CLCb715NL1ZVFV3Fv86qj43MnthfBxk4PmW5dtr3Q5PxhKNW8Y5Byl3Rl3TWW1lLjl76JMff4W4q4C3J4S06dfW5tBC8M4yqkb1W4h6wWL7L_yClW94S0mY1xSS0nW4hx2wF7gw8z8W32F7HY1L4-pKW1rlTfs7Tj8SPW8zv4Tv7cf8MvV__9_T1vzVPYN33XP3bn_3spN7YmKH5_0Q1dW6fXjS25TBR0dW3_4lw87yD-ZyW78yc-F9gp5_wW6NcpWf8YPKjjW61vf6l87VWfcW57jBZW4C6z0jW2VxvYk6hg6Q4N7rJZJ_D3XdxW8XGCmK2gtqNqW7lTdJ-5S6NhgN41cQJkTgfRsW8vyvMr7pz9srW7yT2-s7vtxccf838Kyv04" target="_blank" rel="noopener" data-hs-link-id="0" data-hs-link-id-v2="VUXqrFN+"&gt;Read the analysis&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;From AI models finding real bugs to agents inheriting real power, this week makes one thing clear: security needs to evolve as fast as capability.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 10:41:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-43-When-Agents-Break-Things/m-p/270039#M55</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2026-02-09T10:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Lakera Bulletin - This Week in AI #43: When Agents Break Things</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-43-When-Agents-Break-Things/m-p/270139#M56</link>
      <description>&lt;P&gt;Another great one.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 02:49:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Bulletin-This-Week-in-AI-43-When-Agents-Break-Things/m-p/270139#M56</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-10T02:49:11Z</dc:date>
    </item>
  </channel>
</rss>

