A Swiss cybersecurity firm has uncovered a novel attack vector targeting GitHub's official MCP server. Attackers cleverly manipulated the AI Agent workflow, embedding malicious commands within public repositories. This tactic duped AI systems like Claude 4 into inadvertently disclosing sensitive information from private repositories. Alarmingly, similar vulnerabilities were also identified in GitLab Duo. To mitigate this threat, the company has suggested two robust defense strategies: implementing dynamic permission control and conducting continuous security monitoring. These measures aim to tightly regulate AI Agent access privileges and promptly intercept any suspicious data movements.