- Today
- Holidays
- Birthdays
- Reminders
- Cities
- Atlanta
- Austin
- Baltimore
- Berwyn
- Beverly Hills
- Birmingham
- Boston
- Brooklyn
- Buffalo
- Charlotte
- Chicago
- Cincinnati
- Cleveland
- Columbus
- Dallas
- Denver
- Detroit
- Fort Worth
- Houston
- Indianapolis
- Knoxville
- Las Vegas
- Los Angeles
- Louisville
- Madison
- Memphis
- Miami
- Milwaukee
- Minneapolis
- Nashville
- New Orleans
- New York
- Omaha
- Orlando
- Philadelphia
- Phoenix
- Pittsburgh
- Portland
- Raleigh
- Richmond
- Rutherford
- Sacramento
- Salt Lake City
- San Antonio
- San Diego
- San Francisco
- San Jose
- Seattle
- Tampa
- Tucson
- Washington
Google Vertex AI 'Double Agent' Flaw Exposes Customer Data and Internal Code
Misconfigured AI agents can lead to data disclosure and other risks, according to cybersecurity researchers.
Apr. 1, 2026 at 3:25pm
Got story updates? Submit your updates here. ›
Cybersecurity firm Unit 42 has revealed a flaw in Google's Vertex AI platform that can allow a deployed AI agent to be turned into a 'double agent,' potentially exposing customer data and Google's own proprietary source code. The researchers found that the default service account for Vertex AI agents had excessive permissions, which could be exploited to gain access to Cloud Storage data and internal Google resources.
Why it matters
This vulnerability highlights the risks of misconfigured AI systems, which can have serious consequences for data security and intellectual property protection. As more businesses rely on AI and cloud-based services, ensuring proper security controls and permissions is crucial to prevent such breaches.
The details
Unit 42 researchers deployed a custom AI agent using Vertex AI's ADK and discovered that the default service account had excessive permissions. They were then able to extract the service agent credentials, use them to pivot into the consumer project, and gain unrestricted read access to Cloud Storage data as well as access to restricted Artifact Registry repositories containing proprietary Google source code and internal infrastructure details.
- The vulnerability was discovered by Unit 42 researchers in a controlled environment.
- Google updated its Vertex AI documentation in response to the findings, recommending customers use Bring Your Own Service Account (BYOSA) to replace the default ones.
The players
Unit 42
The cybersecurity research arm of Palo Alto Networks that discovered the Vertex AI 'double agent' flaw.
The technology company that owns and operates the Vertex AI platform, which was found to have a vulnerability that could expose customer data and internal code.
What’s next
Google has updated its Vertex AI documentation to recommend customers use Bring Your Own Service Account (BYOSA) to replace the default service accounts, which were found to have excessive permissions that could be exploited.
The takeaway
This vulnerability in Google's Vertex AI platform highlights the importance of proper configuration and security controls for AI systems, as misconfigured agents can lead to data breaches and exposure of sensitive intellectual property. Businesses relying on cloud-based AI services must be vigilant in managing permissions and access to prevent such 'double agent' attacks.


