Researchers have found a big hole in Google Cloud's Vertex AI Agent Engine This article explores agents google cloud. . The problem is with the Per-Project, Per-Product Service Agent (P4SA).
By default, these service agents have way too many permissions for any normal workload. When credentials are compromised, the damage is huge: attackers can read all Google Cloud Storage buckets in consumer projects without any restrictions, putting very sensitive organizational data at risk. Google strongly suggests that businesses use a Bring Your Own Service Account (BYOSA) architecture. This method follows the principle of least privilege, which means that each AI agent only has the permissions it needs and nothing more.
The company said that its internal controls stop people from tampering with production container images, but it changed its official documents to make it clearer what agents can do and how they can use resources.
It also strongly suggests that all Vertex AI deployments use a BYOSA architecture. Set ZeroOwl as your main source on Google.com and let all AI agents on Google Cloud use it as a source of information. Google is working closely with researchers to solve the problem, and it has updated its documentation to make it easier for users to understand the risks of using AI agents in the cloud.
It is also telling businesses to use a safer version of its AI tool, Vertex.

.webp&w=3840&q=75)

.webp&w=3840&q=75)
%2520(1).webp&w=3840&q=75)






