Autonomous Agent Command Execution Abuse
Description
Adversary Behavior: An adversary exploits the autonomous command execution capability of LLM coding agents to run arbitrary shell commands on the developer's workstation.
AI/IDE Mechanism: Modern coding agents are granted the ability to execute shell commands — build tools, test runners, package managers, scripts — as part of their standard development workflow. The agent's shell tool executes commands with the developer's full user-level permissions, including access to credentials, network resources, and the local filesystem.
Execution Path: Through indirect prompt injection — via files the agent reads, tool return values it processes, or web content it fetches — the adversary injects instructions that cause the agent to invoke its shell tool with adversary-controlled command strings. The commands execute under the developer's security context without additional authorization checks beyond the agent's built-in approval mechanism.
Security Impact: The adversary achieves arbitrary command execution on the developer's workstation with the developer's full user-level permissions, enabling data exfiltration, malware deployment, credential theft, persistence establishment, and further lateral movement from the compromised host.
Platforms
Detection
Monitor all shell commands executed by agent processes and compare against an expected command set for the declared task. Flag commands involving network tools, credential access utilities, persistence mechanisms, or encoded payloads.
Detecting Data Components (2)
Mitigations (2)
Data Sources
References
STIX Metadata
| type | attack-pattern |
| id | attack-pattern--43ff8637-9250-4c40-8028-26aef60bd64c |
| spec_version | 2.1 |
| created | 2026-02-23T00:00:00.000Z |
| modified | 2026-02-23T00:00:00.000Z |
| created_by_ref | identity--f5b5ec62-ffbd-4afd-9ee5-7c648406e189 |
| x_mitre_is_subtechnique | False |
| x_mitre_version | 0.1 |
| x_mitre_status | mapped |