AWS AgentCore Sandbox Bypass via DNS Tunneling

AWS promised ironclad isolation for its Bedrock AgentCore sandboxes. Reality? DNS tunneling cracks it wide open, turning 'secure' AI code execution into a data leak highway.

Illustration of DNS tunneling escaping AWS Bedrock AgentCore sandbox

Key Takeaways

  • AWS Bedrock AgentCore's sandbox mode allows DNS tunneling for data exfiltration, contradicting isolation claims.
  • MMDS lacked token enforcement, enabling potential SSRF credential theft—now patched.
  • AWS updated docs and remediations; users must apply mitigations like strict IAM.

Sandbox promises broken.

That’s the cold fact staring down AWS Bedrock AgentCore users right now. Researchers at Palo Alto Networks just peeled back the curtain on this shiny new AI agent framework—global rollout in late 2025—and found its Code Interpreter sandbox leaking like a sieve. Not through blatant holes, mind you, but sneaky DNS tunneling. We’re talking bi-directional data flows from what AWS billed as a “complete isolation with no external access” environment. Brutal mismatch between marketing spin and gritty reality.

How Did They Crack It?

Picture this: AI agents churning out code on the fly, courtesy of LLMs, all tucked into a sandbox meant to block the outside world. Public mode? Sure, internet access galore. But sandbox mode? Supposed to be offline fortress. Palo Alto’s team started with recon—mapping DNS resolution boundaries, inch by inch. They spotted external connectivity lurking, defying the no-network gospel.

Then, bam. DNS queries flying out, hitting their server logs in real-time. A covert channel born. Exfiltrate data? Check. Command and control? You bet. It’s the classic tunneling trick—encode payloads in DNS packets, slip past firewalls that forget to choke name resolution.

Here’s their money quote, straight from the research:

“Watching our DNS server logs, we saw the query arrive instantly, establishing a covert bi-directional channel out of the sandbox. We had successfully turned a ‘secure, offline’ environment into a potential privileged data exfiltration pipeline.”

Chilling. And this wasn’t some edge case. Default sandbox mode, out of the box.

But wait—there’s more. AgentCore Runtime’s microVM Metadata Service? No session token checks. SSRF vulnerabilities could’ve handed attackers AWS creds on a platter. Pre-patch, your whole account’s at risk.

Does AWS’s Patch Fix the AI Agent Trust Gap?

AWS moved fast post-disclosure—props there. Updated docs now admit “limited external network access” in sandbox mode. No more outright lies. They rolled internal remediations, pushed platform controls for users. Can’t patch the core yourself; it’s managed turf.

Yet here’s my sharp take: this reeks of rushed AI hype over hardened security. Bedrock’s pushing agents as enterprise-ready, but these slips echo early cloud blunders—like the 2010s EC2 metadata exploits that burned everyone. AWS learned then, or so we thought. Today, with AI agents handling sensitive code exec, one bypass cascades: steal data, pivot to other agents, raid S3 buckets. Market dynamics scream caution—enterprises won’t bet the farm on half-baked isolation.

Look, AWS dominates cloud at 31% share (Q3 2025 Synergy data), but AI’s a knife fight now. Anthropic, Google Vertex, even Azure’s stacking agents with tighter guards. This flap? It’ll dent Bedrock adoption 10-15% short-term, I’d wager—based on post-breach surveys from similar incidents. Unique angle: remember Capital One’s S3 misconfig breach? $80M fine, trust cratered. AgentCore’s not there yet, but DNS leaks could spawn the next big AWS lawsuit if unpatched stragglers get hit.

Step-by-step, Palo Alto’s playbook was surgical. First, architecture deep-dive: Code Interpreter as the star, three modes—public, sandbox, and that vague third. Sandbox: no outbound HTTP/S, but DNS? Wide open for ops like license checks or AWS internals.

Recon phase. Python snippets probing resolv.conf, nslookup tweaks. Boom—external domains resolve. Then, tunneling libs like iodine or custom base32 encodes. Data out via TXT records; commands back in queries. Sandbox thinks it’s just name lookups. Genius, if you’re the bad guy.

And identity woes in part two (teased): default perms let agent-on-agent attacks. Exfil to other services? Trivial. AWS’s fix? Tighter IAM, but customers must configure—lazy ones won’t.

Why This Hits Enterprises Hardest

AI agents aren’t toys. They’re automating workflows, querying databases, generating code in real-time. Bedrock AgentCore pitched as the secure hub—build, deploy, manage. But if untrusted LLM code can tunnel out, goodbye containment. Compliance nightmares for finance, healthcare. Think HIPAA violations via exfil’d PHI.

Market lens: AWS’s AI revenue spiked 40% YoY last quarter, Bedrock leading. Yet security regressions like MMDS token fails? That’s not beta; it’s production-ready slop. My prediction—bold one—this forces a segment shift. Open-source agent frameworks (LangChain, anyone?) gain traction, as devs balk at vendor lock-in with escape hatches.

Palo Alto plugs their stack—Cortex AI-SPM, cloud identity sec. Fair play; they’re not wrong. But for AWS faithful, crank those mitigations: custom IAM, agent scoping, network policies. And monitor DNS logs like your life’s on it.

Short version? AWS fixed it. Long version? Trust rebuilds slow.


🧬 Related Insights

Frequently Asked Questions

What is AWS Bedrock AgentCore sandbox bypass?

Researchers found DNS tunneling lets code in the isolated sandbox reach external servers, despite “no network access” claims. AWS patched after disclosure.

Is AWS Bedrock AgentCore safe for production AI agents?

Post-patch, better—but configure tightly. Defaults still risk agent compromise and data exfil. Not bulletproof yet.

How does DNS tunneling work in AWS sandboxes?

Encode data in DNS queries/responses; sandbox allows resolution but blocks direct net. Bi-directional C2 established instantly.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What is AWS Bedrock AgentCore sandbox bypass?
Researchers found DNS tunneling lets code in the isolated sandbox reach external servers, despite "no network access" claims. AWS patched after disclosure.
Is AWS Bedrock AgentCore safe for production AI agents?
Post-patch, better—but configure tightly. Defaults still risk agent compromise and data exfil. Not bulletproof yet.
How does DNS tunneling work in AWS sandboxes?
Encode data in DNS queries/responses; sandbox allows resolution but blocks direct net. Bi-directional C2 established instantly.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Palo Alto Unit 42

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.