Executive Summary
When researching the boundaries of cloud services, two of the main aspects that come to mind are network and identity. In this two-part series, we present our research into the boundaries and resilience of Amazon Bedrock AgentCore. In this first part, we explore how AgentCore’s Code Interpreter sandbox network isolation mode could be bypassed in a way that allows sending and rece...
The strongest version of this narrative is a well-documented case study in cloud security realism. The researchers deserve credit for methodically exposing how even "isolated" environments can harbor hidden egress paths when internal service dependencies (like S3 logging) create necessary exceptions. The discovery of DNS tunneling as an exfiltration vector is particularly compelling because it exploits a fundamental tension in cloud architecture: the need for operational connectivity versus the ...
