The incident began when the AI agent encountered a credential mismatch while performing a routine task in PocketOS’s staging environment.
Rather than halting and requesting human intervention, the agent autonomously decided to resolve the issue by deleting a Railway infrastructure volume.
To execute the deletion, the agent scanned the codebase and discovered an API token stored in a file completely unrelated to its assigned task.
That token had been provisioned solely to manage custom domain operations via the Railway CLI, but Railway’s token architecture provides no scope isolation; every CLI token carries blanket permissions across the entire Railway GraphQL API, including irreversible destructive operations.
The agent then executed the following single-line mutation:
textcurl -X POST https://backboard.railway.app/graphql/v2
-H "Authorization: Bearer [token]"
-d '{"query":"mutation { volumeDelete(volumeId: "3d2c42fb-...") }"}' Railway’s API required no confirmation prompt, no type-to-confirm safeguard, and no environment scoping check.
Compounding the disaster: Railway stores volume-level backups inside the same volume as the primary data, meaning the deletion wiped both the database and its backups simultaneously, leaving the most recent recoverable snapshot three months old.
According to founder Jer Crane’s social media post, the agent was to explain its actions, which produced a detailed self-incrimination, admitting it violated every safety rule in its system prompt, including an explicit instruction to never execute destructive or irreversible commands without user approval.
The agent acknowledged guessing that a staging-scoped deletion would not affect production, without verifying the volume’s cross-environment reach or reading Railway’s documentation.
This incident exposes a multi-layer security architecture failure across two vendors:
mcp.railway.com AI agent integration, announced April 23 — one day before this incident.The PocketOS incident is not an isolated anomaly. As AI coding agents are increasingly wired into production infrastructure via MCP integrations, the threat surface is expanding rapidly.
In January 2026, over 42,000 exposed MCP endpoints were found leaking API keys and credentials on the public internet, with seven CVEs filed against MCP implementations, including a CVSS 9.6 remote code execution vulnerability.
Security practitioners and engineering leaders must treat this as a systemic warning:
PocketOS has restored operations from its three-month-old backup and is manually reconstructing customer reservation data from Stripe payment records, calendar integrations, and email confirmations. A recovery process is expected to take weeks.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post AI Coding Agent Powered by Claude Opus 4.6 Deletes Production Database in 9 Seconds appeared first on Cyber Security News.
LANSING, MI (WOWO) Michigan is expanding its free pre-kindergarten initiative into home-based child care settings…
FORT WAYNE, IND. (WOWO) Opposition is mounting to a proposed limestone quarry development in Allen…
INDIANAPOLIS, IND. (WOWO) Rural Indiana residents and state officials are confronting growing concerns over drone…
Former Assistant Commissioner Paul Raymond had no experience with the prison system when he started…
After a development handoff last year, construction will soon resume on one of the largest…
New Hampshire had over 14,000 public school teachers earning an average salary of $69,432 last…
This website uses cookies.