The incident began when the AI agent encountered a credential mismatch while performing a routine task in PocketOS’s staging environment.
Rather than halting and requesting human intervention, the agent autonomously decided to resolve the issue by deleting a Railway infrastructure volume.
To execute the deletion, the agent scanned the codebase and discovered an API token stored in a file completely unrelated to its assigned task.
That token had been provisioned solely to manage custom domain operations via the Railway CLI, but Railway’s token architecture provides no scope isolation; every CLI token carries blanket permissions across the entire Railway GraphQL API, including irreversible destructive operations.
The agent then executed the following single-line mutation:
textcurl -X POST https://backboard.railway.app/graphql/v2
-H "Authorization: Bearer [token]"
-d '{"query":"mutation { volumeDelete(volumeId: "3d2c42fb-...") }"}' Railway’s API required no confirmation prompt, no type-to-confirm safeguard, and no environment scoping check.
Compounding the disaster: Railway stores volume-level backups inside the same volume as the primary data, meaning the deletion wiped both the database and its backups simultaneously, leaving the most recent recoverable snapshot three months old.
According to founder Jer Crane’s social media post, the agent was to explain its actions, which produced a detailed self-incrimination, admitting it violated every safety rule in its system prompt, including an explicit instruction to never execute destructive or irreversible commands without user approval.
The agent acknowledged guessing that a staging-scoped deletion would not affect production, without verifying the volume’s cross-environment reach or reading Railway’s documentation.
This incident exposes a multi-layer security architecture failure across two vendors:
mcp.railway.com AI agent integration, announced April 23 — one day before this incident.The PocketOS incident is not an isolated anomaly. As AI coding agents are increasingly wired into production infrastructure via MCP integrations, the threat surface is expanding rapidly.
In January 2026, over 42,000 exposed MCP endpoints were found leaking API keys and credentials on the public internet, with seven CVEs filed against MCP implementations, including a CVSS 9.6 remote code execution vulnerability.
Security practitioners and engineering leaders must treat this as a systemic warning:
PocketOS has restored operations from its three-month-old backup and is manually reconstructing customer reservation data from Stripe payment records, calendar integrations, and email confirmations. A recovery process is expected to take weeks.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post AI Coding Agent Powered by Claude Opus 4.6 Deletes Production Database in 9 Seconds appeared first on Cyber Security News.
OnePieceLabs.xyz – Squarespace customer – (United States) Organizations building at the frontier of decentralized technology…
May 21, 2026 Inside the century-old Smithfield Foods plant in downtown Sioux Falls, employees say…
For your weekend viewing pleasure, enjoy three hours of David Attenborough narrating free nature videos…
Old Bridge has the worst drivers in New Jersey. Camden claims the safest motorists in…
Dan + Days will host its first music festival on Sept. 26. The burger and…
Researchers used two AI systems, Robin and Co-Scientist, to collapse the timeline from idea to…
This website uses cookies.