In partnership with

When Your “AI Agent” Role Can Take Over Every Service Account

If you wanted a clean snapshot of how powerful and dangerous today’s “smart” features have become, last week’s security reports gave you one.

Within a single reporting window, Microsoft, Google, and LiteLLM all had to patch critical vulnerabilities that existed only because AI agent infrastructure had been added on top of otherwise mature systems . The features were designed to help. In practice, they quietly opened new paths straight into the heart of production environments.

The details are uncomfortable, but very instructive.

The Three Incidents In Plain Language

  • Microsoft Entra ID: A privilege escalation bug let the “Agent ID Administrator” role for AI agents add credentials to any service principal and impersonate privileged accounts [page:0].
  • Google Gemini CLI: A critical flaw in the Gemini CLI and GitHub Action allowed malicious pull requests to execute arbitrary commands on CI/CD build servers [page:0].
  • LiteLLM Proxy: A SQL injection in LiteLLM’s proxy let attackers read and potentially alter the database managing large language model API keys and usage, with exploitation observed 36 hours after disclosure [page:0].

Get what you want from TV advertising

When growth is often measured at the last click, you’re paying to compete for demand that was created somewhere else.

Reach people in the purchase planning phase before your competitors know these customers even exist.

With high-intent Pinterest signals on Performance TV you can reach audiences earlier where they watch the most.

What Went Wrong In Each Case

Microsoft’s issue sat inside Entra ID, the identity system that controls access to almost everything in an Azure environment.

Researchers found that the special “Agent ID Administrator” role, created for AI agents, could be abused to add credentials to any service principal, not just those tied to agents . Once an attacker obtained that role, they could effectively impersonate high‑privilege identities across the tenant.

This was not a naive buffer overflow in a corner service. It was a logic flaw created by layering a new abstraction on top of identity, where the boundary between “agent” and “regular” accounts was not enforced tightly enough.

Google’s problem looked different but rhymed.

The Gemini CLI and its GitHub Action were built to make it easy to call Gemini as part of a CI pipeline. The flaw came from the way the Action trusted files in the workspace during automated jobs . A malicious pull request could introduce code that the Action would then execute during the build, giving an attacker remote code execution on the CI runner.

The core mistake was simple: treating untrusted repository contents as safe input inside an automated system that already runs with elevated permissions.

LiteLLM’s case was more traditional, but the context matters.

The proxy is used specifically to centralise and manage model API keys and traffic. A SQL injection there is not “just another web bug”. It means an attacker could read or modify the database that stores keys, routing rules, and logs, and exploitation started within about 36 hours of public disclosure .

In all three incidents, the underlying pattern is the same. New AI‑related features created new trust assumptions. Those assumptions were wrong.

Why AI Agent Features Create Especially Sensitive Attack Surfaces

Three Structural Issues To Notice

  • High privilege by design: Agents need broad access to be useful, so their roles tend to start overpowered.
  • Automation without friction: CLIs and Actions are built to “just work” in pipelines, which encourages implicit trust in workspace content.
  • New components in old systems: Proxies and wrappers sit between existing services and models, often without the security maturity of the systems they touch.

AI agents do not live at the edge of a system. They sit in the middle of it.

By design, an agent needs to talk to multiple services, read data, and often take actions on your behalf. That means the roles and keys built for them lean toward broad capability. Once compromised, that breadth becomes a liability.

Automation tooling multiplies the risk.

A CLI that is meant to be used in a CI/CD pipeline will eventually run unattended with high permissions. If it trusts files in the repository too much, or assumes configuration is benign, a single malicious commit can become a remote shell on your build server .

Finally, the ecosystem is young.

Libraries like LiteLLM are moving quickly because demand is real. They often sit in front of billing endpoints and key management, but they have not had a decade of hardened scrutiny the way core identity systems have. When they ship with flaws, the blast radius can exceed their perceived weight in the architecture.

Practical Implications For Teams Shipping With These Tools

If you are a developer, designer, or product owner, none of this is a reason to avoid these tools altogether. It is a reason to treat them as security‑sensitive components, not harmless helpers.

A few practical shifts are worth considering:

Checklist: Using AI Agent Infrastructure Safely

  • Treat agent roles as tier‑0 identities. Limit who can assign or hold them, log every change, and review their effective permissions regularly.
  • Lock down CI/CD runners. Run untrusted pull requests on isolated, ephemeral runners and avoid giving Actions direct access to long‑lived secrets or production accounts.
  • Harden proxies like LiteLLM. Put them behind authentication, restrict database permissions, and keep them off the public internet where possible.
  • Track AI‑specific CVEs. Subscribe to threat bulletins that now include dedicated sections for AI threats and vulnerabilities, rather than relying only on generic feeds [page:0].

The mental model to aim for is simple: if a tool can read or change things across systems, model it like an admin account even if the UI calls it a “helper”.

What This Week Really Signals

The most important conclusion is not that Microsoft, Google or LiteLLM made mistakes. Of course they did. Every vendor will.

The more interesting point is that AI‑centric features are now showing up in weekly threat intelligence bulletins alongside cPanel zero‑days, Mirai botnets, and large‑scale ransomware campaigns . They have become part of the standard attack surface.

That shift has two consequences.

First, security teams need to build explicit playbooks for these components. Incident response that does not know how to rotate keys managed by a proxy, or how to audit an “Agent ID Administrator” role, will lag behind actual risk.

Second, product teams need to internalise that adding “smart” capabilities is not a free move. Every new integration point is another place where trust can be misapplied or over‑granted.

My Take…

The same tools that automate your deployment, summarise your logs, or answer your support tickets can, if misconfigured or exploited, become efficient vehicles for attack across your own systems.

The lesson from this week is not to panic. It is to upgrade your threat model.

If you are going to let an “agent” act on your behalf, you should be at least as cautious about its permissions as you are with a human administrator account. The software does not care which side it works for.

Keep Reading