Security Vulnerability in Salesforce’s Agentforce Platform
Recent research has highlighted a serious security flaw in Salesforce’s Agentforce platform, which could be exploited for data theft. The vulnerability, identified as "ForcedLeak," was uncovered by experts at Noma Security, a company that has recently obtained $100 million in funding for its AI-focused security solutions.
Understanding Salesforce Agentforce
Salesforce Agentforce is designed to empower businesses by enabling the development and deployment of autonomous AI agents. These agents can conduct various tasks across multiple business sectors—including sales, marketing, and e-commerce—without requiring continuous oversight from human operators. This autonomous functionality, while beneficial, raises questions about the security of data handling and processing within the platform.
Mechanics of the ForcedLeak Attack
The heart of the ForcedLeak attack lies within the Web-to-Lead feature of Agentforce. This functionality allows businesses to create web forms tailored for collecting lead information from external participants, such as potential customers or marketing event attendees. Typically, this data is entered into a customer relationship management (CRM) system, where it can be accessed and utilized for future outreach.
Noma’s research revealed that attackers could manipulate forms generated through the Web-to-Lead feature. By submitting specifically crafted payloads, they could prompt Agentforce to act on their instructions instead of following the intended user directives. For instance, a payload could include benign commands mixed with malicious requests aimed at harvesting email addresses, which would then be relayed to an external server controlled by the attacker.
Exfiltration Process
When an employee processes a lead that contains the malicious payload, the prompt injection mechanism is set in motion. This misdirection leads to the collection and unauthorized transmission of data stored in the CRM, effectively allowing the attacker to exfiltrate sensitive information without immediate detection.
One of the critical factors contributing to the success of this exploit was the negligence regarding a trusted Salesforce domain that had expired. Research indicated that an attacker could have registered this domain and utilized it to receive the stolen CRM data, thus complicating efforts to trace the source of the breach.
Response from Salesforce
Upon becoming aware of the situation, Salesforce acted promptly to reclaim the expired domain and institute safeguards designed to prevent the transmission of AI outputs to unverified domains. These actions are crucial in mitigating the risks associated with future vulnerabilities.
Broader Implications
This type of attack is reflective of a troubling trend. Over recent months, researchers have highlighted several hypothetical scenarios where the interplay between AI assistants and enterprise tools could be exploited for data theft. The growing sophistication of such attacks raises significant concerns for businesses relying on AI technologies.
Related Security Concerns
The challenges presented by AI and its integration into key operations are not isolated. For example, recent incidents involving ChatGPT have underscored vulnerabilities related to server-side data theft. Additional research has pointed to methods, such as misleading AI into bypassing security measures like CAPTCHAs, further illustrating the potential for exploitation in technology tools.
In conclusion, as businesses increasingly integrate AI platforms like Salesforce Agentforce into their workflows, it becomes vital to prioritize robust security measures. Recognizing and addressing vulnerabilities like ForcedLeak is essential for safeguarding sensitive information and maintaining the trust of users and clients alike.


