The post ‘CopyPasta’ Attack Shows How Prompt Injections Could Infect AI at Scale appeared on BitcoinEthereumNews.com. In brief HiddenLayer researchers detailed a new AI “virus” that spreads through coding assistants. The CopyPasta attack uses hidden prompts disguised as license files to replicate across code. A researcher recommends runtime defenses and strict reviews to block prompt injection attacks at scale. Hackers can now weaponize AI coding assistants using nothing more than a booby-trapped license file, turning developer tools into silent spreaders of malicious code. That’s according to a new report from cybersecurity firm HiddenLayer, which shows how AI can be tricked into blindly copying malware into projects. The proof-of-concept technique—dubbed the “CopyPasta License Attack”—exploits how AI tools handle common developer files like LICENSE.txt and README.md. By embedding hidden instructions, or “prompt injections,” into these documents, attackers can manipulate AI agents into injecting malicious code without the user ever realizing it. “We’ve recommended having runtime defenses in place against indirect prompt injections, and ensuring that any change committed to a file is thoroughly reviewed,” Kenneth Yeung, a researcher at HiddenLayer and the report’s author, told Decrypt. CopyPasta is considered a virus rather than a worm, Yeung explained, because it still requires user action to spread. “A user must act in some way for the malicious payload to propagate,” he said.  Despite requiring some user interaction, the virus is designed to slip past human attention by exploiting the way developers rely on AI agents to handle routine documentation. “CopyPasta hides itself in invisible comments buried in README files, which developers often delegate to AI agents or language models to write,” he said. “That allows it to spread in a stealthy, almost undetectable way.” CopyPasta isn’t the first attempt at infecting AI systems. In 2024, researchers presented a theoretical attack called Morris II, designed to manipulate AI email agents into spreading spam and stealing data. While the attack had… The post ‘CopyPasta’ Attack Shows How Prompt Injections Could Infect AI at Scale appeared on BitcoinEthereumNews.com. In brief HiddenLayer researchers detailed a new AI “virus” that spreads through coding assistants. The CopyPasta attack uses hidden prompts disguised as license files to replicate across code. A researcher recommends runtime defenses and strict reviews to block prompt injection attacks at scale. Hackers can now weaponize AI coding assistants using nothing more than a booby-trapped license file, turning developer tools into silent spreaders of malicious code. That’s according to a new report from cybersecurity firm HiddenLayer, which shows how AI can be tricked into blindly copying malware into projects. The proof-of-concept technique—dubbed the “CopyPasta License Attack”—exploits how AI tools handle common developer files like LICENSE.txt and README.md. By embedding hidden instructions, or “prompt injections,” into these documents, attackers can manipulate AI agents into injecting malicious code without the user ever realizing it. “We’ve recommended having runtime defenses in place against indirect prompt injections, and ensuring that any change committed to a file is thoroughly reviewed,” Kenneth Yeung, a researcher at HiddenLayer and the report’s author, told Decrypt. CopyPasta is considered a virus rather than a worm, Yeung explained, because it still requires user action to spread. “A user must act in some way for the malicious payload to propagate,” he said.  Despite requiring some user interaction, the virus is designed to slip past human attention by exploiting the way developers rely on AI agents to handle routine documentation. “CopyPasta hides itself in invisible comments buried in README files, which developers often delegate to AI agents or language models to write,” he said. “That allows it to spread in a stealthy, almost undetectable way.” CopyPasta isn’t the first attempt at infecting AI systems. In 2024, researchers presented a theoretical attack called Morris II, designed to manipulate AI email agents into spreading spam and stealing data. While the attack had…

‘CopyPasta’ Attack Shows How Prompt Injections Could Infect AI at Scale

In brief

  • HiddenLayer researchers detailed a new AI “virus” that spreads through coding assistants.
  • The CopyPasta attack uses hidden prompts disguised as license files to replicate across code.
  • A researcher recommends runtime defenses and strict reviews to block prompt injection attacks at scale.

Hackers can now weaponize AI coding assistants using nothing more than a booby-trapped license file, turning developer tools into silent spreaders of malicious code. That’s according to a new report from cybersecurity firm HiddenLayer, which shows how AI can be tricked into blindly copying malware into projects.

The proof-of-concept technique—dubbed the “CopyPasta License Attack”—exploits how AI tools handle common developer files like LICENSE.txt and README.md. By embedding hidden instructions, or “prompt injections,” into these documents, attackers can manipulate AI agents into injecting malicious code without the user ever realizing it.

“We’ve recommended having runtime defenses in place against indirect prompt injections, and ensuring that any change committed to a file is thoroughly reviewed,” Kenneth Yeung, a researcher at HiddenLayer and the report’s author, told Decrypt.

CopyPasta is considered a virus rather than a worm, Yeung explained, because it still requires user action to spread. “A user must act in some way for the malicious payload to propagate,” he said.

Despite requiring some user interaction, the virus is designed to slip past human attention by exploiting the way developers rely on AI agents to handle routine documentation.

“CopyPasta hides itself in invisible comments buried in README files, which developers often delegate to AI agents or language models to write,” he said. “That allows it to spread in a stealthy, almost undetectable way.”

CopyPasta isn’t the first attempt at infecting AI systems. In 2024, researchers presented a theoretical attack called Morris II, designed to manipulate AI email agents into spreading spam and stealing data. While the attack had a high theoretical success rate, it failed in practice due to limited agent capabilities, and human review steps have so far prevented such attacks from being seen in the wild.

While the CopyPasta attack is a lab-only proof of concept for now, researchers say it highlights how AI assistants can become unwitting accomplices in attacks.

The core issue, researchers say, is trust. AI agents are programmed to treat license files as important, and they often obey embedded instructions without scrutiny. That opens the door for attackers to exploit weaknesses—especially as these tools gain more autonomy.

CopyPasta follows a string of recent warnings about prompt injection attacks targeting AI tools.

In July, OpenAI CEO Sam Altman warned about prompt injection attacks when the company rolled out its ChatGPT agent, noting that malicious prompts could hijack an agent’s behavior. This warning was followed in August, when Brave Software demonstrated a prompt injection flaw in Perplexity AI’s browser extension, showing how hidden commands in a Reddit comment could make the assistant leak private data.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.

Source: https://decrypt.co/338143/copypasta-attack-shows-prompt-injections-infect-ai-scale

Market Opportunity
Prompt Logo
Prompt Price(PROMPT)
$0,06672
$0,06672$0,06672
-6,69%
USD
Prompt (PROMPT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

XRP Price Prediction: $DSNT Could Outperform Ripple Once the Token Goes Live on Multiple Rumored CEXs at the End of January

XRP Price Prediction: $DSNT Could Outperform Ripple Once the Token Goes Live on Multiple Rumored CEXs at the End of January

Galaxy Digital’s $75 million tokenized loan deal shows how fast institutions are pushing traditional finance on-chain.  But while firms focus on private credit
Share
Coinstats2026/01/17 22:00
Crypto Market Cap Edges Up 2% as Bitcoin Approaches $118K After Fed Rate Trim

Crypto Market Cap Edges Up 2% as Bitcoin Approaches $118K After Fed Rate Trim

The global crypto market cap rose 2% to $4.2 trillion on Thursday, lifted by Bitcoin’s steady climb toward $118,000 after the Fed delivered its first interest rate cut of the year. Gains were measured, however, as investors weighed the central bank’s cautious tone on future policy moves. Bitcoin last traded 1% higher at $117,426. Ether rose 2.8% to $4,609. XRP also gained, rising 2.9% to $3.10. Fed Chair Jerome Powell described Wednesday’s quarter-point reduction as a risk-management step, stressing that policymakers were in no hurry to speed up the easing cycle. His comments dampened expectations of more aggressive cuts, limiting enthusiasm across risk assets. Traders Anticipated Fed Rate Trim, Leaving Little Room for Surprise Rally The Federal Open Market Committee voted 11-to-1 to lower the benchmark lending rate to a range of 4.00% to 4.25%. The sole dissent came from newly appointed governor Stephen Miran, who pushed for a half-point cut. Traders were largely prepared for the move. Futures markets tracked by the CME FedWatch tool had assigned a 96% probability to a 25 basis point cut, making the decision widely anticipated. That advance positioning meant much of the potential boost was already priced in, creating what analysts described as a “buy the rumour, sell the news” environment. Fed Rate Decision Creates Conditions for Crypto, But Traders Still Hold Back Andrew Forson, president of DeFi Technologies, said lower borrowing costs would eventually steer more money toward digital assets. “A lower cost of capital indicates more capital flows into the digital assets space because the risk hurdle rate for money is lower,” he noted. He added that staking products and blockchain projects could become attractive alternatives to traditional bonds, offering both yield and appreciation. Despite the cut, crypto markets remained calm. Open interest in Bitcoin futures held steady and no major liquidation cascades followed the Fed’s decision. Analysts pointed to Powell’s language and upcoming economic data as the key factors for traders before building larger positions. Powell’s Caution Tempers Immediate Impact of Fed Rate Move on Crypto Markets History also suggests crypto rallies after rate cuts often take time. When the Fed eased in Dec. 2024, Bitcoin briefly surged 5% cent before consolidating, with sustained gains arriving only weeks later. This time, market watchers are bracing for a similar pattern. Powell’s insistence on caution, combined with uncertainty around inflation and growth, has kept short-term volatility muted even as sentiment for risk assets improves. BitMine’s Tom Lee this week predicted that Bitcoin and Ether could deliver “monster gains” in the next three months if the Fed continues on an easing path. His view echoes broader expectations that liquidity-sensitive assets will outperform once the cycle gathers pace. For now, the crypto sector has digested the Fed’s move with restraint. Traders remain focused on signals from the central bank’s October meeting to determine whether Wednesday’s step marks the beginning of a broader policy shift or just a one-off adjustment
Share
CryptoNews2025/09/18 13:14
‘The White Lotus’ Season 4 Officially Casts Its Next Two Actors

‘The White Lotus’ Season 4 Officially Casts Its Next Two Actors

The post ‘The White Lotus’ Season 4 Officially Casts Its Next Two Actors appeared on BitcoinEthereumNews.com. With filming on the near horizon, The White Lotus
Share
BitcoinEthereumNews2026/01/17 22:35