{"guid":"626be573-f64c-480c-a2db-1ccaeec57764","title":"How we hacked Y Combinator companies' AI agents","subtitle":null,"slug":"god2025-56489-how-we-hacked-y-combinator","link":"https://c3voc.de","description":"We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.\n\nLicensed to the public under https://creativecommons.org/licenses/by-sa/4.0/","original_language":"eng","persons":["René Brandel"],"tags":["56489","2025","god2025","Track 2","god2025-eng","god2025","Day 1"],"view_count":336,"promoted":false,"date":"2025-11-26T14:55:00.000+01:00","release_date":"2025-11-26T00:00:00.000+01:00","updated_at":"2026-03-30T12:15:05.964+02:00","length":1468,"duration":1468,"thumb_url":"https://static.media.ccc.de/media/events/god/2025/56489-626be573-f64c-480c-a2db-1ccaeec57764.jpg","poster_url":"https://static.media.ccc.de/media/events/god/2025/56489-626be573-f64c-480c-a2db-1ccaeec57764_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/god/2025/56489-626be573-f64c-480c-a2db-1ccaeec57764.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/god/2025/56489-626be573-f64c-480c-a2db-1ccaeec57764.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/god2025-56489-how-we-hacked-y-combinator","url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_title":"German OWASP Day 2025","conference_url":"https://api.media.ccc.de/public/conferences/god2025","related":[],"recordings":[{"size":15,"length":1468,"mime_type":"audio/opus","language":"eng","filename":"god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-11-26T16:27:58.350+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/opus/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_opus.opus","url":"https://api.media.ccc.de/public/recordings/93602","event_url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":175,"length":1468,"mime_type":"video/webm","language":"eng","filename":"god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-11-26T16:41:26.232+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/webm-hd/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/93608","event_url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":57,"length":1468,"mime_type":"video/webm","language":"eng","filename":"god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-11-26T16:37:52.425+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/webm-sd/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/93607","event_url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":62,"length":1468,"mime_type":"video/mp4","language":"eng","filename":"god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-11-26T16:34:42.294+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_sd.mp4","url":"https://api.media.ccc.de/public/recordings/93606","event_url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":22,"length":1468,"mime_type":"audio/mpeg","language":"eng","filename":"god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-11-26T16:28:02.150+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/mp3/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/93603","event_url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":296,"length":1468,"mime_type":"video/mp4","language":"eng","filename":"god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-11-26T16:04:34.925+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/h264-hd/god2025-56489-eng-How_we_hacked_Y_Combinator_companies_AI_agents_hd.mp4","url":"https://api.media.ccc.de/public/recordings/93588","event_url":"https://api.media.ccc.de/public/events/626be573-f64c-480c-a2db-1ccaeec57764","conference_url":"https://api.media.ccc.de/public/conferences/god2025"}]}