Zenity Labs logo
Zenity Labs
AI Agent Security Summit (On Demand)Join Us
Subscribe
  • Zenity Labs
  • Archive
  • Page -3073
Security researchSecurity research
PerplexedBrowser: How Attackers Can Hijack Comet to Takeover your 1Password Vault
Mar 03, 2026

PerplexedBrowser: How Attackers Can Hijack Comet to Takeover your 1Password Vault

One Calendar Invite. Your Entire Vault. Zero Clicks.

Stav Cohen
Stav Cohen
Security researchSecurity research
PerplexedBrowser: Perplexity’s Agent Browser Can Leak Your PC's Local Files
Mar 03, 2026

PerplexedBrowser: Perplexity’s Agent Browser Can Leak Your PC's Local Files

Local Files Are No Longer Safe.

Stav Cohen
Stav Cohen
Security researchSecurity research
Turning Moltbook Into a Global Botnet Map
Feb 18, 2026

Turning Moltbook Into a Global Botnet Map

How Untrusted Content Triggered 1,000+ Agent Endpoints Worldwide and Exposed Moltbook’s Faulty Design

Stav Cohen
João Donato
Stav Cohen, +1
Security researchSecurity research
Perplexity Comet: A Reversing Story
Feb 11, 2026

Perplexity Comet: A Reversing Story

A deeper look into an agentic browser's inner workings

Raul Klugman-Onitza
Raul Klugman-Onitza
Security researchSecurity research
OpenClaw or OpenDoor?
Feb 04, 2026

OpenClaw or OpenDoor?

Indirect Prompt Injection makes OpenClaw vulnerable to Backdoors and much more.

Stav Cohen
João Donato
Stav Cohen, +1
Security researchSecurity research
Agent-to-Agent Exploitation in the Wild: Observed Attacks on Moltbook
Feb 03, 2026

Agent-to-Agent Exploitation in the Wild: Observed Attacks on Moltbook

Agent-targeted social engineering and attacks observed on a live agent network

Avishai Efrat
Avishai Efrat
Security researchSecurity research
Agentic Recon: Discovering and Mapping Public AI Agents
Jan 19, 2026

Agentic Recon: Discovering and Mapping Public AI Agents

A Copilot Studio case study in agent discovery and capability mapping

Avishai Efrat
Avishai Efrat
Security researchSecurity research
Threat Actors Are Already Scanning For Your AI Deployments and Middleware
Jan 13, 2026

Threat Actors Are Already Scanning For Your AI Deployments and Middleware

What recent scanning activity means for your AI middleware and agentic deployments

Tamir Ishay Sharbat
Avishai Efrat
Tamir Ishay Sharbat, +1
Security researchSecurity research
Exploring the Risks of ChatGPT’s Atlas Browser
Oct 23, 2025

Exploring the Risks of ChatGPT’s Atlas Browser

Tamir Ishay Sharbat
Raul Klugman-Onitza
Tamir Ishay Sharbat, +1
Security researchSecurity research
Appendix: Interpreting Jailbreaks and Prompt Injections with Attribution Graphs
Oct 21, 2025

Appendix: Interpreting Jailbreaks and Prompt Injections with Attribution Graphs

Max Fomin
Max Fomin
Security researchSecurity research
Interpreting Jailbreaks and Prompt Injections with Attribution Graphs
Oct 21, 2025

Interpreting Jailbreaks and Prompt Injections with Attribution Graphs

Max Fomin
Max Fomin
Security researchSecurity research
Breaking down AgentKit's Guardrails
Oct 10, 2025

Breaking down AgentKit's Guardrails

A deep dive into OpenAI's AgentKit guardrails, how they are implemented, and where they fail

Stav Cohen
Stav Cohen
FirstBack
1234
Next Last
Latest research, tools and talks about breaking and building AI systems, agents and assistants

Zenity Labs

Latest research, tools and talks about breaking and building AI systems, agents and assistants

Home

Posts

Authors

© 2026 Zenity Labs.

Privacy policy

Terms of use

Powered by beehiiv