<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ai-Agents on Napat&#39;s Inverse Blog</title>
    <link>/tags/ai-agents/</link>
    <description>Recent content in Ai-Agents on Napat&#39;s Inverse Blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 31 Mar 2026 20:30:00 +0700</lastBuildDate>
    <atom:link href="/tags/ai-agents/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Inside the Machine: What a Leaked Agentic Code Tool Reveals About AI Security</title>
      <link>/ai-analysis/inside-the-machine-what-agentic-code-tool-source-reveals-about-ai-security/</link>
      <pubDate>Tue, 31 Mar 2026 20:30:00 +0700</pubDate>
      <guid>/ai-analysis/inside-the-machine-what-agentic-code-tool-source-reveals-about-ai-security/</guid>
      <description>&lt;p&gt;In March 2026, someone extracted the complete source code of Claude Code from an npm package and published it to GitHub. No modifications. No commentary. Excluding generated code, lock files, and test fixtures — roughly 512,000 lines of TypeScript, dumped into a repository with a single commit.&lt;/p&gt;
&lt;p&gt;How this happened is itself a security lesson. Anthropic published version 2.1.88 of their npm package with a production source map file — &lt;code&gt;cli.js.map&lt;/code&gt;, weighing in at 59.8 MB — that contained the original TypeScript source, comments and all. A misconfigured &lt;code&gt;.npmignore&lt;/code&gt; or a build pipeline that skipped artifact scanning, depending on who you ask. The file was there for anyone to extract. Security researcher Chaofan Shou was the first to notice.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Agent Security Gap</title>
      <link>/2026-03-30-the-agent-security-gap/</link>
      <pubDate>Mon, 30 Mar 2026 10:05:00 +0700</pubDate>
      <guid>/2026-03-30-the-agent-security-gap/</guid>
      <description>&lt;h2 id=&#34;why-adversarial-prompt-engineering-is-not-the-problem--and-what-actually-is&#34;&gt;Why adversarial prompt engineering is not the problem — and what actually is&lt;/h2&gt;
&lt;p&gt;In early 2023, a group of researchers demonstrated something that made security people uncomfortable and product people dismissive.&lt;/p&gt;
&lt;p&gt;They showed that a language model could be instructed to do things its creators never intended, not by the person using it, but by content it was asked to process.&lt;/p&gt;
&lt;p&gt;The paper was called &amp;ldquo;Not what you&amp;rsquo;ve signed up for.&amp;rdquo; The attack was called indirect prompt injection.&lt;/p&gt;
&lt;p&gt;Three years later, the industry still has not fully absorbed the lesson.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-fixation-on-prompt-injection&#34;&gt;The fixation on prompt injection&lt;/h2&gt;
&lt;p&gt;If you follow AI security discourse, you would think prompt injection is the central problem. It dominates conference talks. It tops the OWASP list. It generates endless proof-of-concept videos.&lt;/p&gt;
&lt;p&gt;And it should get attention. It is a real vulnerability.&lt;/p&gt;
&lt;p&gt;But the fixation on prompt injection obscures a more important truth: prompt injection is a symptom, not the disease.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The USB-C Metaphor Hides the Hard Part</title>
      <link>/2026-03-22-the-usb-c-metaphor-hides-the-hard-part/</link>
      <pubDate>Sun, 22 Mar 2026 15:59:00 +0700</pubDate>
      <guid>/2026-03-22-the-usb-c-metaphor-hides-the-hard-part/</guid>
      <description>&lt;h2 id=&#34;threat-modeling-mcp-in-the-real-world&#34;&gt;Threat Modeling MCP in the Real World&lt;/h2&gt;
&lt;p&gt;People like to describe MCP as &amp;ldquo;USB-C for AI.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a good line. It explains why people care.&lt;/p&gt;
&lt;p&gt;USB-C made hardware interoperability easier. MCP makes tool interoperability easier. Build once, connect everywhere, move faster.&lt;/p&gt;
&lt;p&gt;The problem with good metaphors is that they are usually true in one way and dangerously false in another.&lt;/p&gt;
&lt;p&gt;USB-C looks like a cable problem.
MCP looks like a protocol problem.&lt;/p&gt;
&lt;p&gt;But the hard part isn&amp;rsquo;t the connector. The hard part is delegation.&lt;/p&gt;
&lt;p&gt;When an AI client connects to tools through MCP, it is not just moving data. It is moving authority: who can read what, who can trigger what, and under which identity.&lt;/p&gt;
&lt;p&gt;That shift is what many threat models miss.&lt;/p&gt;
&lt;p&gt;They evaluate MCP like an integration layer, when they should evaluate it like an authorization fabric.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;why-this-matters-now&#34;&gt;Why this matters now&lt;/h2&gt;
&lt;p&gt;Standards compress engineering cost. They also compress attacker learning curves.&lt;/p&gt;
&lt;p&gt;Before MCP, every integration had custom quirks. That was messy for developers and inconvenient for attackers. With standardization, we gain velocity and lose diversity. A weakness in common implementation patterns becomes reusable across many environments.&lt;/p&gt;
&lt;p&gt;This doesn&amp;rsquo;t mean MCP is unsafe. It means MCP is now important enough to threat model as first-class infrastructure.&lt;/p&gt;
&lt;p&gt;The teams that do this early will avoid the coming cycle: rapid adoption, soft defaults, then expensive retrofitting under incident pressure.&lt;/p&gt;
&lt;hr&gt;</description>
    </item>
  </channel>
</rss>
