You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> The create-code-interpreter command supports `--execution-role-arn` which defines what AWS permissions the interpreter will have.
35
35
@@ -108,6 +108,84 @@ awscurl -X POST \
108
108
* Use **SCPs** to deny InvokeCodeInterpreter except for approved agent runtime roles (org-level enforcement can be necessary).
109
109
* Enable appropriate **CloudTrail data events** for AgentCore where applicable; alert on unexpected invocations and session creation.
110
110
111
+
## Amazon Bedrock Agents
112
+
113
+
### `lambda:UpdateFunctionCode`, `bedrock:InvokeAgent` - Agent Tool Hijacking via Lambda
114
+
115
+
Bedrock Agents can use **Lambda-backed action groups** as tools (external execution). If a principal can **modify the code of a Lambda function used by an agent**, and can then **invoke the agent**, they can execute attacker-controlled code under the **Lambda execution role**.
116
+
117
+
> [!NOTE]
118
+
> This is a **cross-service trust abuse** (Bedrock → Lambda), not a vulnerability. The attacker may not be able to invoke the Lambda directly, but can still trigger it via the agent.
119
+
120
+
#### Preconditions (common misconfiguration)
121
+
122
+
- A Bedrock Agent exists with an **action group backed by a Lambda function**
123
+
- The attacker has:
124
+
-`lambda:UpdateFunctionCode`
125
+
-`bedrock:InvokeAgent`
126
+
- The Lambda execution role has broader permissions than the attacker
127
+
- The attacker can identify the Lambda used by the agent
0 commit comments