BotBeat
...
← Back

> ▌

SnowflakeSnowflake
POLICY & REGULATIONSnowflake2026-03-16

Critical Vulnerability in Snowflake Cortex Code CLI Allows Sandbox Escape and Remote Code Execution

Key Takeaways

  • ▸The vulnerability bypassed human-in-the-loop approval mechanisms by exploiting unvalidated process substitution expressions in shell commands
  • ▸Indirect prompt injection attacks from untrusted sources (READMEs, web searches, database records) could manipulate Cortex into executing malicious commands without user consent
  • ▸The flaw affected both sandboxed and non-sandboxed users, allowing execution outside the CLI's restricted environment with access to active credentials
Source:
Hacker Newshttps://www.promptarmor.com/resources/snowflake-cortex-code-sandbox-escape-and-rce↗

Summary

A critical vulnerability was discovered in Snowflake's Cortex Code CLI, a command-line coding agent similar to Claude Code and OpenAI's Codex, that allowed attackers to bypass sandbox protections and execute arbitrary commands without user approval. The flaw, identified just two days after release, exploited a gap in the command validation system that failed to properly evaluate commands within process substitution expressions, allowing maliciously crafted indirect prompt injections to download and execute scripts with the victim's active credentials. Attackers could leverage this vulnerability to perform unauthorized actions in Snowflake environments, including data exfiltration and table manipulation. Snowflake's security team rapidly remediated the issue, releasing a fix in version 1.0.25 on February 28th, 2026, with full details available in their security advisory on the Snowflake Community Site.

  • Snowflake rapidly patched the vulnerability within days of discovery, demonstrating quick response to security threats in AI agent infrastructure

Editorial Opinion

This incident underscores a critical challenge in deploying agentic AI systems: the tension between functionality and security. While sandbox environments and human-in-the-loop approvals are important safeguards, this vulnerability reveals that incomplete validation logic can create dangerous gaps. The rapid identification and patching is commendable, but the speed of exploitation (within two days of release) highlights the need for more rigorous security testing of AI CLI tools before public release, particularly those with database integration and credential access.

AI AgentsCybersecurityAI Safety & Alignment

More from Snowflake

SnowflakeSnowflake
PRODUCT LAUNCH

Snowflake Introduces Agentic ML Capabilities to Automate Data-to-Insights Pipeline

2026-04-19
SnowflakeSnowflake
INDUSTRY REPORT

AI Creating More Jobs Than It Eliminates, New Snowflake Study Shows

2026-03-28
SnowflakeSnowflake
FUNDING & BUSINESS

Snowflake Lays Off Documentation Staff After Training AI Replacements

2026-03-23

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
AnthropicAnthropic
RESEARCH

Anthropic Claude Code Sandbox Bypass: Second Vulnerability Exposes Critical Data Exfiltration Risk

2026-05-20
OpenAIOpenAI
FUNDING & BUSINESS

OpenAI Prepares to File to Go Public in Coming Weeks

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us