Human-in-the-loop (HITL) safeguards that AI agents rely on can be subverted, allowing attackers to weaponize them to run ...
Research shows a .NET proxy design flaw enables file writes and RCE through attacker-supplied WSDL in multiple products.
Of all the Linux commands, rm is notorious. It's easy to completely wipe out your system with one mislaid rm command as root.