KAIROS Security Concerns

Description

Security criticism that KAIROS's autonomous nature broadens the prompt injection attack surface. A compromised instruction hidden in the context window could survive compaction, be laundered into KAIROS's memory, and act autonomously while the user sleeps. The GrowthBook remote configuration channel (hourly polling) can also affect daemon behavior without user consent.

Key claims

Relations

Sources

none