Communicating with AI agents (like OpenClaw) via messaging apps (like Slack and Telegram) has become much more popular. But it can expose users to a largely unrecognized LLM-specific data exfiltration risk, because these apps support ‘link previews’ as a feature. With previews enabled, user data can be exfiltrated automatically after receiving a malicious link in an LLM-generated message – whereas without previews, the user would typically have to click the malicious link to exfiltrate data. For example, OpenClaw via Telegram is exposed by default. Test any agent / communication app pairing below!

    • Optional@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 hours ago

      Link shortening, as a different example. Thankfully it finally sort of died. Pre-loading is another. Tiktok is uploading before the file is saved, is another.