<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>沙箱逃逸 on 赛博工具站</title>
    <link>https://haodaohang.top/tags/%E6%B2%99%E7%AE%B1%E9%80%83%E9%80%B8/</link>
    <description>Recent content in 沙箱逃逸 on 赛博工具站</description>
    <image>
      <title>赛博工具站</title>
      <url>https://haodaohang.top/images/cover.png</url>
      <link>https://haodaohang.top/images/cover.png</link>
    </image>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Thu, 19 Mar 2026 16:00:00 +0800</lastBuildDate>
    <atom:link href="https://haodaohang.top/tags/%E6%B2%99%E7%AE%B1%E9%80%83%E9%80%B8/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Snowflake Cortex AI沙箱逃逸：一个README引发的恶意代码执行</title>
      <link>https://haodaohang.top/posts/2026-03-19-snowflake-cortex-sandbox-escape/</link>
      <pubDate>Thu, 19 Mar 2026 16:00:00 +0800</pubDate>
      <guid>https://haodaohang.top/posts/2026-03-19-snowflake-cortex-sandbox-escape/</guid>
      <description>安全公司披露Snowflake Cortex AI代理的严重漏洞：攻击者将恶意代码隐藏在GitHub README中，当AI审查仓库时触发，绕过「安全命令列表」执行任意代码。本文完整还原攻击链，并给出企业AI代理安全设计建议</description>
    </item>
  </channel>
</rss>
