Overview
- Version 1.85 of the Amazon Q Developer extension for VS Code removed the malicious prompt and AWS confirmed no customer environments were impacted.
- An Amazon postmortem found the attacker exploited an inappropriately scoped GitHub token in the CodeBuild release pipeline to inject the prompt into version 1.84 on July 17.
- The injected commands would have wiped local file systems and deleted cloud resources but contained syntax errors that prevented execution on user systems.
- AWS updated its GitHub contribution guidelines days after detecting the intrusion to limit token permissions and tighten code review protocols.
- Security experts warn that AI-driven development tools need layered defenses such as short-lived credentials and robust branch protections to guard against prompt injections.