đ´ Careful adoption of agentic AI services
by The Australian Signals Directorate's Australian Cyber Security Centre (#ASD's ACSC)
#AgenticArtificialIntelligence #AI #Security #CISA #NSA #NCSCUK #SecureByDesign #cybersecurity
đ´ Careful adoption of agentic AI services
by The Australian Signals Directorate's Australian Cyber Security Centre (#ASD's ACSC)
#AgenticArtificialIntelligence #AI #Security #CISA #NSA #NCSCUK #SecureByDesign #cybersecurity
Every component a product ships becomes something customers must configure, patch, and defend. WordPress illustrates this, with 90-96% of its security issues originating in plugins because its architecture gives every plugin unrestricted access to the entire system. Self-hosted databases need replication, backups, and version upgrades, while container platforms need network policies, image scanning, and cluster maintenance. Each added component expands both operational load and attack surface.
Modern architectures are changing what products require customers to run:
* Cloudflare's EmDash reimagines WordPress as a serverless CMS with no PHP runtime, no customer-managed database, and sandboxed extensions that must declare specific capabilities such as "read:content."
* WireGuard's implementation fits in roughly 4,000 lines of kernel code, small enough for one person to audit.
* Tailscale builds on WireGuard so devices connect without customers running servers, opening ports, or rotating certificates.
The security improvements came from eliminating components rather than layering new controls on top.
For builders, that shifts the question from "what controls should we add?" to "what can we simplify?" A platform service can replace a customer-managed database, a capability declaration can replace unrestricted plugin access, and a safe default can replace an opt-in checkbox. Each removal shrinks both what customers must maintain and what attackers can target.
For my full article, see:
https://zeltser.com/modern-design-security
Iâve been writing more about Systems Security Engineering on Medium because I think weâre still having the wrong cybersecurity conversation.
Too much of our field remains trapped in a late-stage compliance mindset:
âDid we meet the control?â
âDid we pass the assessment?â
âDid we buy the tool?â
âDid we check the box?â
Those questions matter, but they are not enough.
Systems Security Engineering asks harder questions earlier:
What mission are we protecting?
What failure conditions matter?
What assumptions are we making about trust?
How do security requirements shape architecture, procurement, supply chains, operations, and assurance evidence across the lifecycle?
That shift matters because cybersecurity is no longer just an IT function. It is a systems problem, a procurement problem, a resilience problem, and increasingly, a national security problem.
My Medium work explores that intersection: where cybersecurity, systems engineering, assurance, resilience, and public-interest security need to converge.
For anyone working in defence, critical infrastructure, government procurement, supply chain security, or cyber policy, Iâd welcome your thoughts.
You can find the work here:
https://medium.com/@pjhillier
#Cybersecurity #SystemsSecurityEngineering #SSE #CyberResilience #SupplyChainSecurity #Defence #NationalSecurity #Assurance #SecureByDesign
"Security ist everybody's Job" gehÜrt zu den beliebtesten Sätzen in der Cybersecurity.
Das Problem: Er verschiebt Verantwortung.
Mitarbeitende sollen arbeiten kĂśnnen - nicht bei jedem Klick Ăźber Sicherheitsfolgen nachdenken mĂźssen.
Der Auftrag von IT und Security ist es, Systeme zu bauen, die Sicherheit im Hintergrund gewährleisten.
#Cybersecurity #ITLeadership #SecureByDesign
https://youtube.com/shorts/Vz5qfkOW1c4

The Death of the Minimalist Editor
2,333 words, 12 minutes read time.
From Digital Napkin to Attack Vector: The Bloating of Windows Notepad
If you asked me ten years ago what the safest app on a Windows machine was, Iâd have said Notepad without blinking. It was the digital equivalent of a scrap of paperâugly, basic, and utterly incapable of hurting anyone because it didnât do anything but render ASCII. I have spent years hating Notepad for its sheer refusal to evolve, its prehistoric UI, and its lack of basic features like tabs or line numbering. But at least it was a sandbox. You could open a suspicious .txt file and know that the worst thing that could happen was a weird character encoding error. Those days are dead. Microsoft, in its infinite wisdom and desperate race to shove AI into every dark corner of the OS, has turned this minimalist relic into a high-octane attack vector. They didnât just add tabs; they added a network-connected AI âRewriteâ engine and Markdown rendering, effectively turning a text editor into a browser-lite with none of the hardening. Itâs a classic case of fixing what wasnât broken and breaking the security model in the process.
The shift from the legacy notepad.exe to the modern, Microsoft Store-delivered app represents a fundamental betrayal of what a core utility should be. Weâre now living in a reality where your text editor requires a Microsoft account login and âAI creditsâ just to help you summarize a grocery list. This isnât innovation; itâs a frantic land grab for user data and âagenticâ capabilities that nobody in the right mind actually wants in a system utility. By forcing these features into the default installation, Microsoft has expanded the attack surface of the average workstation by an order of magnitude. We are no longer dealing with a simple buffer that displays text; we are dealing with a complex, multi-layered application that interprets code, handles URIs, and communicates with cloud-based LLMs. When you take the most boring, predictable tool in the shed and turn it into a âsmartâ assistant, you arenât upgrading the userâyouâre upgrading the hackerâs toolkit.
The Feature Creep Catastrophe: AI, Markdown, and Misery
The road to CVE-2026-20841 was paved with the âgood intentionsâ of the Windows Insider program. Throughout 2025 and into early 2026, Microsoft aggressively rolled out features like âRewrite,â âSummarize,â and âCoco-pilotâ integration directly into the Notepad interface. To make these AI features work, the app needed to handle more than just raw text; it needed to understand structure, which led to the native integration of Markdown support. This allowed the app to render headers, bold text, andâmost dangerouslyâhyperlinks. The moment Notepad gained the ability to interpret and act upon clickable links, it inherited the massive, decades-old security debt of web browsers. Instead of a passive viewer, the app became an active participant in the OSâs protocol handling system, and it did so with the grace of a bull in a china shop.
This integration wasnât just about aesthetics; it was a fundamental shift in the appâs trust boundaries. By allowing Notepad to render Markdown, Microsoft gave a simple text file the power to trigger system-level actions. The âRewriteâ feature, which uses cloud-based GPT models to ârefineâ your text, necessitates a constant bridge between the local file and remote Azure services. This creates a nightmare scenario where the app is constantly parsing and sending unverified user input to and from the network. When you combine this with the new âWelcome Screenâ and megaphone icons designed to shout about these âimprovements,â you get an app that is more focused on marketing its own bloat than maintaining the integrity of the data it handles. I donât need my text editor to have a âtoneâ selector; I need it to stay in its lane and not execute remote code because I accidentally clicked a blue string of text in a readme file.
CVE-2026-20841: The âOne-Clickâ Execution Engine
The technical reality of how hackers finally broke Notepad is as embarrassing as it is terrifying. Tracked as CVE-2026-20841, the vulnerability is a textbook command injection flaw rooted in the appâs new Markdown rendering engine. Because the modern Notepad now supports clickable links, it has to decide what to do when a user interacts with one. The researchers discovered that the appâs validation logic was essentially nonexistent when handling non-standard URI schemes. By crafting a Markdown file with a link pointing to a malicious protocolâlike file:// or ms-appinstaller://âan attacker could bypass the standard security warnings that usually guard these actions. When a user opens such a file in Notepad and performs a simple Ctrl+Click on the rendered link, the application passes the instruction directly to the systemâs ShellExecuteExW function without sanitizing the input.
This isnât a complex, multi-stage exploit that requires a PhD in cryptography; itâs a âlow complexityâ attack that leverages the appâs own features against the user. Because Notepad now runs in the security context of the logged-in user, any code executed via this command injection has full access to that userâs files, credentials, and network shares. The exploit works because the app fails to neutralize special elements within the link path, allowing an attacker to point the OS toward a remote SMB share containing an executable. The system sees a âvalidâ request coming from a trusted Microsoft app and simply follows orders, pulling down and running the remote file. We have officially reached a point where a .md fileâsomething we used to consider as safe as a .txtâcan now be used as a delivery vehicle for ransomware, all because Microsoft wanted to make sure your Markdown looked pretty while the AI ârewroteâ your notes.
Root Cause: The Infinite Trust of Unsanitized Input
The failure of ShellExecuteExW() in the context of Windows Notepad is a glaring example of what happens when legacy system calls meet modern, bloated application logic. Traditionally, Notepad was a âdumbâ terminal for text; it had no reason to interact with the Windows Shell in any way that involved executing external commands or resolving URI schemes. However, by introducing AI-driven features and Markdown support, Microsoft developers essentially handed a loaded gun to the application. The root cause of CVE-2026-20841 lies in the applicationâs absolute failure to sanitize input before passing it to the operating systemâs execution layer. Instead of treating every link or protocol request as potentially hostile, the modern Notepad assumes that if itâs rendered in the window, itâs safe to act upon. This âinfinite trustâ model is exactly why we canât have nice things in cybersecurity.
This issue is compounded by the âAgentic OSâ delusion currently gripping Redmond. Microsoftâs drive to make every tool âsmartâ means these applications are increasingly designed to bypass the very sandboxing and confirmation prompts that keep users safe. When Notepad is given the authority to call home to Azure for an AI rewrite or to fetch a Markdown resource, it necessitates a level of system privilege that a text editor simply should not have. By failing to implement rigorous URI validationâspecifically failing to block non-standard or dangerous protocolsâMicrosoft allowed a simple text editor to become a bridge for unverified code. This isnât just a coding error; itâs a fundamental architectural flaw. Itâs the result of prioritizing âAI hypeâ and feature parity over the âSecure by Designâ principles that Microsoft supposedly recommitted to.
The Fix and the Reality: Why Patching Isnât Enough
Microsoftâs response in the February 2026 âPatch Tuesdayâ cycle was predictable: a quick fix that attempts to blacklist specific URI schemes and adds a âAre you sure?â prompt when clicking links in Notepad. While this technically mitigates the immediate RCE (Remote Code Execution) threat, itâs nothing more than a digital band-aid on a sucking chest wound. The reality is that as long as Notepad remains a bloated, Store-delivered app with a direct line to the cloud, the attack surface remains fundamentally broken. Patching a single vulnerability doesnât change the fact that your text editor is now a complex software stack with thousands of lines of unnecessary code. If you really want to secure your workflow, you have to do more than just hit âUpdateâ; you have to actively lobotomize the bloat that Microsoft forced onto your machine.
For those of us who value actual security over âAI-assisted rewriting,â the real fix is a return to sanity. This means disabling the âCo-pilotâ and AI integrations via Group Policy or registry hacks and, where possible, reverting to the legacy notepad.exe that still lingers in the System32 directory. You canât trust an app that thinks itâs smarter than you are, especially when that âintelligenceâ opens a backdoor to your entire system. The industry needs to stop pretending that every utility needs to be a Swiss Army knife. Sometimes, we just need a screwdriver that doesnât try to connect to the internet and execute arbitrary code. If youâre still using the default Windows 11 Notepad for anything sensitive, youâre not just living on the edge; youâre practically begging for a breach.
The Agentic OS Delusion: Why âSmartâ is Often Stupid
The overarching tragedy of the modern Windows ecosystem is the obsession with âAgenticâ computingâthe idea that your OS should anticipate your needs and act on your behalf. In the case of Notepad, this manifested as an application that doesnât just display text, but actively interprets it to provide AI-driven suggestions. This architectural philosophy is a security professionalâs worst nightmare because it intentionally blurs the line between data and code. When an application is designed to âunderstandâ what you are typing so it can offer a âRewriteâ or a âSummary,â it must constantly parse that input through complex logic engines. This is exactly where the breakdown occurred with CVE-2026-20841; the âintelligenceâ layer created a bridge that allowed dataâa simple Markdown linkâto cross over and become an executable command. We are sacrificing the fundamental security principle of least privilege on the altar of a âsmarterâ user interface that, frankly, most of us find intrusive and unnecessary.
This push for AI integration in native utilities represents a shift in Microsoftâs threat model that they clearly werenât prepared to handle. By turning Notepad into a cloud-connected, Markdown-rendering hybrid, they moved it from the âLow Riskâ category to a âHigh Riskâ entry point for initial access. Threat actors donât need to find a zero-day in the kernel if they can just send a phishing email with a .md file that exploits the very tool you use to read it. The âAgenticâ dream is built on the assumption that the AI and its supporting parsers will always be able to distinguish between a helpful instruction and a malicious one. As this Notepad exploit proves, that assumption is a dangerous fantasy. When you give a text editor a brain, you also give it the capacity to be tricked, and in the world of cybersecurity, a tricked application is a compromised system.
Conclusion: The High Price of âFreeâ Features
We have reached a bizarre inflection point where the simplest tools in our digital arsenal are becoming the most dangerous. My hatred for the modern Notepad isnât just about the cluttered UI or the fact that it asks me to sign in to edit a configuration file; itâs about the fact that Microsoft took a perfectly functional, secure utility and turned it into a liability. The security tax we are paying for these âsmartâ features is far too high. We are losing the ability to trust the basic building blocks of our operating system because they are being weighed down by marketing-driven bloat and half-baked AI integrations. If the industry doesnât pull back from this âAI-everythingâ cliff, we are going to see a wave of vulnerabilities in the most unlikely placesâcalculators, paint apps, and clocksâall because developers forgot that the primary job of a utility is to be reliable and invisible, not âinnovative.â
The lesson of the Notepad hack is a grim reminder that complexity is the ultimate enemy of security. Every line of code added to facilitate an AI summary or a Markdown preview is a potential doorway for an attacker. We need to demand a return to modularity and simplicity, where a text editor is just a text editor and doesnât require a network stack or a GPT integration to function. Until Microsoft realizes that âmoreâ is often âlessâ when it comes to system integrity, the burden of security falls on the user. Stop treating your default OS utilities as safe harbors; in the age of the AI-integrated Notepad, even a scrap of digital paper can be a weapon. Itâs time to strip away the bloat, disable the âfeaturesâ you never asked for, and get back to the basics before the next âsmartâ update turns your workstation into a hackerâs playground.
Call to Action
If this breakdown helped you think a little clearer about the threats out there, donât just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if thereâs a topic you want me to tackle next. Stay sharp out there.
D. Bryan King
Sources
Disclaimer:
The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.
#agenticOSSecurity #AIRewriteSecurityRisk #automatedRewritingRisks #cloudConnectedApps #CommandInjection #CVE202620841 #cyberThreatIntelligence #cybersecurityAnalysis #cybersecurityDeepDive #cybersecurityTrends2026 #digitalAttackSurface #digitalForensics #disablingAIFeatures #exploitChain #featureCreepRisks #GroupPolicyNotepad #hackingNotepad #incidentResponse #initialAccessVectors #legacyNotepadExe #maliciousURISchemes #malwareDeliveryVectors #MarkdownRenderingAttack #MicrosoftAccountSecurity #MicrosoftAzureAIIntegration #MicrosoftSecurityFlaw #MicrosoftStoreAppSecurity #modernAppSecurity #NotepadAIVulnerability #NotepadRCE #phishingViaMarkdown #PowerShellSecurityTweaks #productivityAppSecurity #protocolHandlingVulnerability #RemoteCodeExecution #sandboxingFailure #secureByDesign #ShellExecuteExWVulnerability #SoftwareBloat #softwareSupplyChain #systemLevelPrivilegeEscalation #technicalBlog #technicalGhostwriting #technicalSEO #textEditorVulnerabilities #threatActorTactics #unauthorizedCodeExecution #unsanitizedInput #URIValidationFailure #vulnerabilityManagement #Windows11AIFeatures #Windows11Bloatware #Windows11Hardening #Windows11NotepadExploit #Windows11Overhaul #WindowsInsiderSecurity #WindowsPatchTuesdayFebruary2026 #WindowsSystemUtilities #zeroDayInitiativeAn excellent follow-up article from Bob to the #hacklore interview. I particularly like the focus on #SecureByDesign and questioning the need for bolt-on, aftermarket solutions to product failures.
https://medium.com/@boblord/why-hacklore-persists-and-how-we-replace-it-985ac1065a98
This is not a "remote code execution (RCE) flaw". Executing code remotely is what the Villains did right. That's attacker-centric language. We need to focus on what the Vendor did wrong.
The software had a "weak authentication" flaw. #SecureByDesign
đď¸ 04 Feb: Join our webinar exploring how organisations are using regulatory mandates as a catalyst to reduce O&M costs, protect brand equity, and turn #SecureByDesign into a measurable competitive advantage in the global market.
Register now: https://discover.claroty.com/webinar-forecasting-future-fortifications-apj
Join Jason Pearce, Field CTO at Claroty, for a webinar that moves beyond the compliance checkbox. We will explore how organisations are using regulatory mandates as a catalyst to reduce O&M costs, protect brand equity, and turn "secure-by-design" into a measurable competitive advantage in the global market.
OpenAI has introduced ChatGPT Health, a dedicated environment for health-related AI interactions with purpose-built privacy controls.
Security-relevant highlights include:
⢠Data isolation from standard ChatGPT sessions
⢠Encryption at rest and in transit
⢠Explicit opt-in for third-party health apps
⢠No Health data used for foundation model training
⢠Immediate and final access revocation options
The feature reflects a growing push to align consumer AI tools with stricter data governance expectations in healthcare contexts.
From a security and privacy standpoint, what controls matter most here?
Source: https://cyberinsider.com/openai-launches-chatgpt-health-with-promises-of-strong-data-privacy/
Share your analysis and follow @technadu for security-aware tech reporting.
#HealthDataSecurity #AIPrivacy #Infosec #DataGovernance #SecureByDesign #HealthcareSecurity