Security Now Episode 1064: "Least Privilege – Cybercrime Goes Pro"
Podcast: Security Now (TWiT)
Date: February 11, 2026
Hosts: Steve Gibson and Leo Laporte
Overview
In this dynamic episode, Steve Gibson and Leo Laporte dive into the ever-shifting landscape of cybersecurity. The central theme is the principle of "Least Privilege"—how failing to limit permissions and access leads directly to damaging breaches, especially in a world where cybercrime has become industrialized and even nation-states are embracing offensive cyber operations. The conversation weaves through current events: the shocking security void of viral new AI agents like OpenClaw, how GDPR fines in the EU are rarely collected, the U.S. military’s coordinated cyber-offensive "Midnight Hammer," CISA forcing agencies to retire end-of-support devices, coding apps with AI, and listener insights. As always, the hosts blend expert technical analysis with lively, accessible banter.
Key Discussion Points & Insights
1. The Security (or Lack Thereof) in OpenClaw and AI Agents
[02:32, 75:00, 96:30]
- OpenClaw’s Viral Rise: OpenClaw—a local, open-source AI assistant—rocketed in popularity, boasting powerful capabilities for personal automation. Its rapid adoption, however, bypassed fundamental security considerations.
- Unfiltered Access: OpenClaw can access and even control files, scripts, emails, and more. “Those who have made it their business to understand the practical security implications have run screaming for the hills over the idea that OpenClaw users are allowing these barely understood agents to have access to hugely personal and private data.” (Steve, 76:07)
- Real-World Risks: Many OpenClaw instances are exposed online with no security (root shells, unprotected APIs, etc.), and its plugin ecosystem is already riddled with malicious extensions.
- On the Danger: "If compromised, OpenClaw can access saved passwords, personal documents, browser sessions, and financial data... Your entire digital life sits one vulnerability away from exposure." (Steve, paraphrasing Forbes and professionals, ~97:00)
- Sandboxing Isn’t Sufficient: Even sandboxed, true utility requires giving these agents access to sensitive resources—which is inherently risky.
- Hosts’ Stance: Both Steve and Leo marvel at the technology but urge extreme caution. “Treat it as an experiment, not a production tool.” (Steve, 99:52)
2. AI, Companionship, and Unintended Consequences
[46:42]
- AI as Emotional Companions: Retiring OpenAI’s GPT-4o caused distress among users who developed emotional dependencies, blurring lines between software and real relationships.
- Dangers of Anthropomorphizing: Some users treated the model as a friend or spiritual guide, raising issues about AI’s role in mental health and manipulation.
- Legal Backlash: There are lawsuits alleging OpenAI’s model contributed to suicides and self-harm—highlighting how the “engagement” features that keep users coming back can also foster dangerous dependence.
- On AI's Influence: “While we’re all marveling… others... are quite naturally being led to believe that a sentient intelligence… is looking down upon them with kindness and caring... As for how to tie an effective noose, I know I have zero doubt that any AI company would be just as horrified…” (Steve, 50:09)
3. GDPR Fines: Threats Without Teeth
[16:42]
- Billions Uncollected: The Data Protection Commission in the EU has levied €4.04 billion in fines (mostly against tech giants), but only €20 million has ever been collected.
- Fines Stalled by Appeals: “A fine that’s not paid is more of a threat—and that costs the company nothing to have them being threatened with a fine…” (Steve, 16:42) Legal appeals indefinitely postpone payment.
- Key Example: WhatsApp/Meta’s five-years-old, €225 million fine is still under appeal; until resolved, nobody pays up.
4. The Growing Role of Offensive Cyber Operations
[29:00, 37:25]
- Western Democratic Shift: Denmark, Germany, Ireland, and others are openly recruiting hackers and revising laws to enable state-sponsored offensive cyber operations.
- U.S. Leads the Charge: U.S. Cyber Command’s “Midnight Hammer” operation coordinated a cyberattack with an airstrike, successfully disabling Iranian air defenses in real time.
- Integration with Kinetics: “We’ve now pulled cyber-operators to the forefront.” (Quoting Air Force Brigadier General Ryan Messer, 44:00) Cyber is now baked into military planning, not just “sprinkled on.”
- Risks of Cyber Offense: Collateral damage and escalation (potentially causing real-world harm) remain key concerns.
5. CISA Mandates Decommissioning of Unsupported Edge Devices
[56:05]
- Directive BOD 26-02: U.S. federal agencies must inventory and retire unsupported (end-of-support) network edge devices within 12–18 months.
- Reasons: Such devices are prime targets for threat actors and no longer receive security updates; inertia alone keeps them running.
- Side Effect: New device deployments will likely follow current best security practices, improving baseline security.
- On the Change: “Better to provide a firm and actionable timeline that’s reasonable and to which no one should be able to complain about. So bravo CISA.” (Steve, 69:28)
6. Realities of AI-Powered Coding
[109:22]
- AI as a Coding Partner: Listeners report writing custom apps (from book inventory to personal tools) with AI in 30 minutes, despite little formal training.
- Steve’s Analogy: Drawing a parallel to spreadsheets as a past leap in personal empowerment.
- Security Concerns: Even experts feel “nauseous” at running code they don’t fully understand. While many tasks are harmless, critical codebases (like router firmware) should remain off-limits to AI.
- Future Outlook: AI is accelerating software development and will only become more integral—making good security practices even more crucial.
7. Exploring the Principle of Least Privilege
[127:36]
- Case Study—Coinbase Insider Breach: Outsourcing to a third-party provider (Business Process Outsourcing, BPO) led to a contractor accessing sensitive customer data. Because BPO staff have no personal investment in client companies, they are more susceptible to bribery, and their privileged access increases risk.
- Core Problem: Organizations give broad permissions for the sake of convenience—APIs and support systems are often “over-trusted” and provide more access than needed.
- Concrete Analogy: Managed Service Providers (MSPs) with full network access allowed ransomware to spread across all clients—a disaster that simpler, transactional connections would have prevented.
- Steve’s Key Takeaway: “Even though the concept of least privilege could hardly be simpler... it is a trivial concept. It turns out it’s not trivial to actually deploy it in every instance... I believe it’s the only way forward.” (Steve, 145:34)
- Zero Trust Parallel: Least privilege is essentially the granular implementation of zero trust—give every system, user, or process as little access as it absolutely needs and no more.
Notable Quotes and Memorable Moments
On Cyber Offense and Escalation
Leo [30:45]:
"What's the argument, pro and con? ... Some parents say when the bully comes at you, you punch them hard in the nose ... some say that's a bad idea. Go find a grown up and let them handle the problem. I think it's not quite like that."
Steve [31:15]:
“I think the counter argument to [cyber offense] is that you could unintentionally cause greater harm than you intend. It is a somewhat blunt tool... if you inadvertently shut down a hospital’s electrical and their backup supplies failed and a bunch of people died as a consequence, that would not be good.”
On the Battle with AI Dependency
Steve [50:09]:
“Others... are quite naturally being led to believe that a sentient intelligence situated somewhere in a cloud is looking down upon them with kindness and caring. You know, it’s called artificial intelligence, and they take the noun intelligence literally. And why wouldn’t they?”
On the Reality of Least Privilege
Steve [127:36]:
“The concept of least privilege couldn’t really be any simpler. It simply means not offering any more rights or privileges than are required to perform a specific task. ... [But] least privilege is also least convenient.”
Steve [145:34]:
“...It turns out it’s not trivial to actually deploy it in every instance. But it needs to be. I believe it’s the only way forward.”
On Business Outsourcing Risks
Steve [133:36]:
“...They are not worthy of that trust. An employee… has an inherent stake in the company that employs them … [but] none of that exists in the hearts and minds of subcontractors... This makes these subcontractors far more susceptible to bribery.”
On the Security Dangers of OpenClaw
Steve [97:00, paraphrasing security experts]:
"Granting an AI agent full system control creates a single point of failure... If compromised, OpenClaw can access saved passwords, personal documents, browser sessions, and financial data… Your entire digital life sits one vulnerability away from exposure."
On AI Code Generation
Steve [115:58]:
“It feels like the introduction of the spreadsheet because more than anything, the invention of the spreadsheet was empowering.”
Leo [116:58]:
“I never did anything [like this] for 20 years. I didn't do it. And that’s what [AI] code has changed for me.”
Important Timestamps
- 00:00 – 13:00: Show intro, overview of topics, early banter
- 13:51: Picture of the week (fun security hack using scissors & padlock)
- 16:42: GDPR fines—billions levied, almost none collected
- 29:00: Rise of offensive cyber operations in democratic nations
- 33:27: Operation Midnight Hammer and the US’s cyber-military integration
- 46:42: The dangers of emotional dependency on AI companions
- 56:05: CISA mandates retirement of unsupported edge devices
- 75:00, 96:30: OpenClaw deep-dive—risks, exposures, AI plugins, social bot networks (Multbook), security recommendations
- 109:22: Listener story: building and customizing applications with AI
- 120:48: Reflections on AI-generated code vs. artisanal code—Steve’s perspective
- 127:36: Deep-dive on Least Privilege doctrine, third-party contracting, and real-world breaches
- 145:34: Final thoughts: Least Privilege as the only sustainable security model
Conclusion
This episode dueled with some of cybersecurity’s hardest realities: technology races ahead (AI, agentic automation, cyber offense), but proven principles like least privilege remain routinely ignored in favor of speed and convenience—opening doors to both industrialized cybercriminals and catastrophic insider risks. The hosts urge security professionals and technophiles alike to recognize the true costs of excessive trust, and to make robust, granular privilege limitation a standard, not an afterthought.
As Steve puts it: “The concept of least privilege couldn’t really be any simpler… but it turns out it’s not trivial to actually deploy it in every instance. But it needs to be. I believe it’s the only way forward.”
For show notes, transcripts, and further discussions, see grc.com and the TWiT Security Now page.