Check Point Research discovered a vulnerability in ChatGPT's code execution runtime that allowed data exfiltration via a DNS-based side channel. Because the sandboxed Python environment blocked direct outbound internet access but still permitted DNS resolution, a malicious prompt could encode sensitive conversation data into

10m read timeFrom research.checkpoint.com
Post cover image
Table of contents
Key TakeawaysWhat HappenedThe Intended SafeguardsFrom One Message to Silent ExfiltrationMalicious GPTsFrom Data Exfiltration to Remote ShellDNS Tunneling in an AI RuntimeConclusion

Sort: