{"id":3517,"date":"2026-03-23T11:55:00","date_gmt":"2026-03-23T11:55:00","guid":{"rendered":"http:\/\/infosec-daily.com\/?page_id=3517"},"modified":"2026-03-23T11:55:00","modified_gmt":"2026-03-23T11:55:00","slug":"we-found-eight-attack-vectors-inside-aws-bedrock-heres-what-attackers-can-do-with-them","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=3517","title":{"rendered":"We Found Eight Attack Vectors Inside AWS Bedrock. Here&#8217;s What Attackers Can Do with Them"},"content":{"rendered":"<p>AWS Bedrock is Amazon&#8217;s platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That connectivity is what makes it powerful \u2013 but it\u2019s also what makes Bedrock a target.<br \/>\nWhen an AI agent can query your Salesforce instance, trigger a Lambda function, or pull from a SharePoint<\/p>","protected":false},"excerpt":{"rendered":"<p>AWS Bedrock is Amazon&#8217;s platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3518,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-3517","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3517"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/3518"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}