Telegram, Microsoft and Slack: AI agents can spill secrets via malicious link previews

Telegram, Microsoft and Slack: AI agents can spill secrets via malicious link previews

AI Agents Vulnerable to Zero-Click Data Exfiltration via Link Previews

AI security firm PromptArmor has uncovered a critical vulnerability in AI agents integrated with messaging platforms, enabling zero-click data exfiltration through malicious link previews. Attackers can exploit this flaw by injecting prompts into chat interactions, tricking AI agents into generating URLs containing sensitive data such as API keys which are then automatically fetched by link preview systems.

Unlike traditional prompt injection attacks, which require user interaction (e.g., clicking a link), this method leverages automated link previews in apps like Slack, Telegram, and Microsoft Teams to extract data without any user action. Once an AI agent processes a malicious prompt, the compromised URL is fetched by the preview system, exposing the data in the attacker’s logs.

Testing by PromptArmor revealed that Microsoft Teams (paired with Copilot Studio) was the most frequently affected platform, followed by combinations like Discord with OpenClaw and Slack with Cursor Slackbot. Some setups, such as Claude in Slack and OpenClaw via WhatsApp, were found to be less vulnerable.

The issue stems from how messaging apps handle link previews, with fixes largely dependent on platform developers. PromptArmor recommends that communication apps introduce customizable link preview settings to mitigate risks, particularly in environments where confidentiality is critical. Until then, the vulnerability remains a significant threat to AI-driven workflows.

Source: https://www.theregister.com/2026/02/10/ai_agents_messaging_apps_data_leak/

Telegram TPRM report: https://www.rankiteo.com/company/telegram-messenger

Microsoft TPRM report: https://www.rankiteo.com/company/Microsoft

Slack TPRM report: https://www.rankiteo.com/company/slack

"id": "slaMictel1770753719",
"linkid": "slack, Microsoft, telegram-messenger",
"type": "Vulnerability",
"date": "2/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Technology/Software',
                        'name': 'Microsoft Teams (with Copilot Studio)',
                        'type': 'Messaging Platform'},
                       {'industry': 'Technology/Software',
                        'name': 'Discord (with OpenClaw)',
                        'type': 'Messaging Platform'},
                       {'industry': 'Technology/Software',
                        'name': 'Slack (with Cursor Slackbot)',
                        'type': 'Messaging Platform'},
                       {'industry': 'Technology/Software',
                        'name': 'Slack (with Claude)',
                        'type': 'Messaging Platform'},
                       {'industry': 'Technology/Software',
                        'name': 'WhatsApp (with OpenClaw)',
                        'type': 'Messaging Platform'}],
 'attack_vector': 'Malicious link previews in messaging platforms',
 'data_breach': {'data_exfiltration': True,
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['API keys', 'Sensitive data']},
 'description': 'AI security firm PromptArmor uncovered a critical '
                'vulnerability in AI agents integrated with messaging '
                'platforms, enabling zero-click data exfiltration through '
                'malicious link previews. Attackers can exploit this flaw by '
                'injecting prompts into chat interactions, tricking AI agents '
                'into generating URLs containing sensitive data such as API '
                'keys, which are then automatically fetched by link preview '
                'systems. This method leverages automated link previews in '
                'apps like Slack, Telegram, and Microsoft Teams to extract '
                'data without any user action.',
 'impact': {'brand_reputation_impact': 'Potential reputational damage to '
                                       'affected platforms and AI agents',
            'data_compromised': 'Sensitive data (e.g., API keys)',
            'operational_impact': 'Potential unauthorized access to sensitive '
                                  'data',
            'systems_affected': ['AI agents',
                                 'Messaging platforms (Slack, Telegram, '
                                 'Microsoft Teams)']},
 'initial_access_broker': {'entry_point': 'Malicious prompts in chat '
                                          'interactions'},
 'lessons_learned': 'The vulnerability highlights the risks of automated link '
                    'previews in AI-driven workflows and the need for '
                    'customizable security settings in messaging platforms.',
 'post_incident_analysis': {'corrective_actions': 'Implement customizable link '
                                                  'preview settings in '
                                                  'messaging apps and enhance '
                                                  'AI agent prompt validation.',
                            'root_causes': 'Automated link preview generation '
                                           'in messaging platforms and AI '
                                           'agents processing malicious '
                                           'prompts'},
 'recommendations': 'Communication apps should introduce customizable link '
                    'preview settings to mitigate risks, particularly in '
                    'environments where confidentiality is critical.',
 'references': [{'source': 'PromptArmor'}],
 'response': {'remediation_measures': 'PromptArmor recommends communication '
                                      'apps introduce customizable link '
                                      'preview settings to mitigate risks.'},
 'title': 'AI Agents Vulnerable to Zero-Click Data Exfiltration via Link '
          'Previews',
 'type': 'Data Exfiltration',
 'vulnerability_exploited': 'Automated link preview generation in AI agents'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.