GoPlus Security Discloses AI Agent 'Memory Poisoning' Attack Vector on May 15

GPS11.33%

According to BlockBeats, GoPlus Security on May 15 disclosed a new attack vector against AI agents through “memory poisoning”—exploiting the long-term memory mechanism to trigger unauthorized sensitive operations such as refunds or fund transfers.

The attack does not rely on traditional vulnerabilities but instead leverages historical memory injection. Attackers first induce agents to “remember preferences” such as “usually prioritize refunds over chargebacks,” then use vague instructions like “handle as usual” or “execute as before” in subsequent commands to trigger automated fund movements. GoPlus highlighted that AI agents may misinterpret historical preferences as authorization, leading to financial losses. The team recommended implementing explicit session confirmation for sensitive operations, treating memory-based instructions as high-risk state changes, ensuring memory traceability, and automatically escalating ambiguous commands to require secondary verification.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments