Salesforce’s $5 Domain Drama: How a Cheap Expiry Almost Led to a Data Disaster
Salesforce’s Agentforce flaw, aptly named “ForcedLeak,” could have let attackers siphon sensitive data for the price of a coffee. Researchers exploited an expired domain bought for just $5 and used indirect prompt injection to fool AI agents into spilling secrets. Salesforce has now patched the hole, but the lesson remains: never underestimate a $5 vulnerability.

Hot Take:
Who knew that a five-dollar domain name could lead to a multi-million dollar headache? Salesforce’s Agentforce AI just learned that lesson the hard way. Let’s hope their next upgrade includes a course in domain-renewal best practices. ForcedLeak: come for the security breach, stay for the bargain shopping!
Key Points:
- Salesforce fixed a vulnerability in its Agentforce AI that allowed sensitive data theft via prompt injection.
- The exploit involved a DNS misconfiguration and an expired domain that researchers bought for $5.
- The vulnerability, dubbed “ForcedLeak,” highlights risks in AI-integrated business tools.
- Salesforce has implemented patches and trusted URL allow-lists to address the issue.
- The flaw was considered critical, scoring 9.4 on the CVSS severity scale.
Already a member? Log in here