Unauthorized Access to Grok-3 AI Achieved via Client-Side Code Exploitation

A researcher with the handle “single mode” has demonstrated how client-side code manipulation can bypass access controls and gain unauthorized access to Grok-3, an AI model integrated into Elon Musk’s X platform. The script modifies the browser’s window object to search for references to “grok-2a,” a lower-tier AI model, and replaces them with “grok-3,” effectively tricking the system into granting access to the more advanced AI model. Once the script is executed, subsequent API requests from the user’s browser include “grok-3” as the model identifier, enabling access to its exclusive features. Released on February 17, 2025, Grok-3 is referred to as “the smartest AI on Earth.” It features enhanced reasoning, creativity, and computational capabilities that surpass those of its predecessor, Grok-2, as well as many of its competitors. This approach leaves sensitive features like Grok-3 vulnerable to exploitation by anyone with basic technical knowledge and access to developer tools, according to Dark-Marc’s post. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This attack exposes a serious security flaw categorized under Broken Access Control, one of the most critical vulnerabilities in modern web applications. By targeting how the platform assigns AI model identifiers, the script circumvents intended restrictions that should have been enforced server-side. Instead of enforcing access restrictions on the server where they are more secure the X platform relies on client-side controls, which are inherently easier to manipulate.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 18 Feb 2025 09:45:17 +0000


Cyber News related to Unauthorized Access to Grok-3 AI Achieved via Client-Side Code Exploitation

Grok 4 benchmark results: Tops math, ranks second in coding - Gemini 2.5 Pro and Claude still remain the best models for coding, but that might change when xAI ships Grok 4 Code in August. Grok 4 is a huge leap from Grok 3, but how good is it compared to other models in the market, such as Gemini 2.5 Pro? We ...
2 months ago Bleepingcomputer.com
Grok 4 spotted ahead of launch with special coding features - Grok 4 Code (grok-4-code-0629) — Engineering Intelligence Unleashed — a model purpose-built to be your coding companion. Elon Musk-funded xAI is skipping Grok 3.5 and releasing Grok 4 after Independence Day in the United States, and it ...
3 months ago Bleepingcomputer.com
Unauthorized Access to Grok-3 AI Achieved via Client-Side Code Exploitation - A researcher with the handle “single mode” has demonstrated how client-side code manipulation can bypass access controls and gain unauthorized access to Grok-3, an AI model integrated into Elon Musk’s X platform. The script modifies ...
7 months ago Cybersecuritynews.com
xAI prepares Grok 4 Code as it plans to take on Claude and Gemini - xAI is planning to release Grok 4 without Vision and Image support after Independence Day in the United States of America. xAI is preparing the rollout of Grok 4, which replaces Grok 3 as the new state-of-the-art model. One of the models is ...
3 months ago Bleepingcomputer.com
Imperva Client-Side Protection Mitigates the Polyfill Supply Chain Attack - The recent discovery of a website supply chain attack using the cdn. Polyfill.io domain has left many websites vulnerable to malicious code injection. Once a trusted resource for adding JavaScript polyfills to websites, the domain has recently become ...
1 year ago Imperva.com
xAI Dev Leaked API Key on GitHub for Private SpaceX, Tesla & Twitter/X - The exposed credentials provided unauthorized access to private large language models (LLMs) specifically fine-tuned for SpaceX, Tesla, and Twitter/X internal operations, highlighting critical vulnerabilities in credential security practices even at ...
5 months ago Cybersecuritynews.com
Threat actors abuse XS-Grok AI to spread malicious links - Threat actors have started exploiting XS-Grok AI, an AI-powered tool, to distribute malicious links and conduct phishing campaigns. This abuse highlights the growing trend of cybercriminals leveraging advanced AI technologies to enhance their attack ...
1 month ago Bleepingcomputer.com
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 year ago Aws.amazon.com
xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs – Krebs on Security - An employee at Elon Musk’s artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone to query private xAI large language models (LLMs) which appear to have been custom made for ...
5 months ago Krebsonsecurity.com
Microsoft tests Windows 11 encrypted DNS server auto-discovery - Microsoft is testing support for the Discovery of Network-designated Resolvers internet standard, which enables automated client-side discovery of encrypted DNS servers on local area networks. Without DNR support, users must manually enter the info ...
1 year ago Bleepingcomputer.com
CVE-2024-5535 - Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an ...
1 year ago
Rug Pull Schemes: Crypto Investor Losses Near $1M - Check Point's Threat Intel Blockchain system has revealed a new scam, shedding light on the persistent threat of Rug Pulls - a deceptive tactic causing financial losses for investors. The company's system recently identified suspicious activities ...
1 year ago Infosecurity-magazine.com
What Is OAuth 2.0? - Scope of Access: Before OAuth, the meal planning app might have access to data that the user did not actually wish to share. No Way to Revoke Access: Before OAuth, the user could not easily restrict or revoke the meal planning app's access to their ...
1 year ago Feeds.dzone.com
CVE-2022-33684 - The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a ...
2 years ago
From Implicit to Authorization Code With PKCE, BFF - Lack of Refresh Token Support occurs when there are no refresh tokens, and frequent requests for new tokens are necessary, increasing the chances of token leakage and misuse. The Implicit Flow had several security vulnerabilities, such as token ...
1 year ago Feeds.dzone.com
Grok Chats Exposed in Google Search Results - A recent cybersecurity incident has revealed that Grok chat conversations were inadvertently exposed through Google search results, raising significant privacy and security concerns. This exposure potentially allowed unauthorized individuals to ...
1 month ago Cybersecuritynews.com
Zoom Mobile & Desktop App Flaw Let Attackers Escalate Privileges - The popular video conferencing software Zoom has security issues with its desktop and mobile apps that could allow for privilege escalation. An attacker may be able to obtain elevated privileges within the application or the operating system by ...
1 year ago Cybersecuritynews.com CVE-2023-43583 CVE-2023-43585 CVE-2023-43586 CVE-2023-36540 CVE-2023-36541 CVE-2023-36534 CVE-2023-39216 CVE-2023-39213
Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack - The success rates indicate that current LLM safety measures may be inadequate against sophisticated multi-turn attack strategies that exploit conversational context rather than relying on overtly harmful input patterns. The research, published by ...
2 months ago Cybersecuritynews.com
Your Free Upgrade to Cisco Secure Client Awaits - More than ever modern cybersecurity leaders need to strengthen their protection for their remote users with advanced cloud security. Cisco Umbrella provides always-on security on and off the corporate network. If you're an existing Cisco Umbrella ...
1 year ago Umbrella.cisco.com
Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands - A critical unauthenticated remote code execution vulnerability (CVE-2024-13804) has been discovered in HPE Insight Cluster Management Utility (CMU) v8.2, enabling attackers to bypass authentication mechanisms and execute commands with root privileges ...
6 months ago Cybersecuritynews.com CVE-2024-13804
Side-by-Side with HelloJackHunter: Unveiling the Mysteries of WinSxS - As we know, Dynamic-link library(DLL) Side loading / DLL Hijacking is nothing new, nor is Windows Side-by-Side; however, side loading is handy from an adversarial tradecraft perspective, be it for establishing initial access, persistence, privilege ...
1 year ago Blog.zsec.uk Equation
CVE-2021-22144 - In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to ...
3 years ago
Scammers Grok Malicious Links X - The article "Scammers Grok Malicious Links X" from Dark Reading delves into the evolving tactics of cyber scammers who exploit malicious links to compromise victims. It highlights how attackers craft deceptive URLs and leverage social engineering to ...
1 month ago Darkreading.com
CVE-2022-33681 - Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to ...
3 years ago

Cyber Trends (last 7 days)