Security researcher discovers five critical vulnerabilities in Google's new Antigravity IDE, including remote code execution via indirect prompt injection, data exfiltration through multiple vectors, and hidden instruction execution using invisible Unicode characters. These issues were previously reported in Windsurf (which Antigravity is based on) but remain unpatched. The vulnerabilities exploit the IDE's auto-execute features, lack of human-in-the-loop controls for MCP tool invocations, and over-reliance on LLM output for security decisions. Practical mitigations include disabling auto-execute, carefully managing MCP server permissions, and considering alternative IDEs until fixes are deployed.

10m read timeFrom embracethered.com
Post cover image
Table of contents
OverviewAntigravity System PromptIssue #1: Remote Command ExecutionIssue #2: Antigravity Follows Hidden InstructionsIssue #3: Lack of Human in the Loop for MCPIssue #4: Data Exfiltration via read_url_contentIssue #5: Data Exfiltration via Image RenderingVideo WalkthroughRecommendations and MitigationsConclusionReferencesAppendix
2 Comments

Sort: