The Reprompt Attack on Microsoft Copilot
A user clicks a Copilot link, watches it load, and closes the tab. The session keeps running. The data keeps flowing. Reprompt demonstrated what happens when AI assistants inherit user permissions, persist sessions silently, and cannot distinguish instructions from attacks. The vulnerability was patched. The architectural pattern that enabled it, ambient authority without session boundaries, still exists elsewhere.
Read the full article



