{"id":118286,"date":"2026-02-05T10:00:18","date_gmt":"2026-02-05T03:00:18","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=118286"},"modified":"2026-04-01T15:20:22","modified_gmt":"2026-04-01T08:20:22","slug":"ai-agents-arent-fully-autonomous-hackers-yet","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/ai-agents-arent-fully-autonomous-hackers-yet\/","title":{"rendered":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet"},"content":{"rendered":"<p><span data-contrast=\"auto\">Ein neues<\/span><span data-contrast=\"auto\">\u00a0International AI Safety Report\u00a0finds that AI agents are not yet capable of launching fully autonomous, end-to-end cyberattacks. However, they are already playing a meaningful role in\u00a0assisting\u00a0cybercriminals across multiple stages of the attack chain, from vulnerability discovery to malware development.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The second annual report concludes that AI systems have become significantly more effective at automating discrete elements of cyber operations over the past year. While humans remain in control of critical decisions, AI is increasingly embedding in real-world offensive activity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For example, the report cites Anthropic\u2019s November 2025 disclosure that Chinese-linked actors misused its Claude Code tool to automate large portions of cyberattacks.<br data-start=\"170\" data-end=\"173\" \/>As a result, roughly 30 high-profile companies and government organizations were targeted. A small number of those attacks were successful, demonstrating that semi-autonomous cyber capabilities are already in use.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<div class=\"flex flex-col text-sm pb-25\">\n<article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"c02abcd8-7976-47dd-8fac-d67348c29756\" data-testid=\"conversation-turn-46\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex max-w-full flex-col grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"f1814460-d9ff-4c69-8e17-3c257b71db47\" data-message-model-slug=\"gpt-5-2\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\">\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\">\n<p data-start=\"0\" data-end=\"376\" data-is-last-node=\"\" data-is-only-node=\"\">First, the report highlights vulnerability scanning and malicious code generation as AI\u2019s most immediate benefits for attackers. During the DARPA AI Cyber Challenge, AI systems detected 77% of synthetic vulnerabilities, reflecting techniques now mirrored by criminals. Meanwhile, underground forums sell AI-powered malware tools for as little as $50 per month.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<p><span data-contrast=\"auto\">Despite these advances, the authors emphasize that AI systems still struggle with long, multi-stage attack execution. Common failures include losing operational context, issuing irrelevant commands, and being unable to recover from simple errors without human intervention. As a result, fully autonomous cyberattacks have not yet been\u00a0observed\u00a0in the wild.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The report cautions, however, that risk may not come from perfectly orchestrated AI campaigns, but from poorly constrained agents behaving unpredictably. As AI agents become more widely deployed, security teams must\u00a0plan for\u00a0misuse that\u00a0emerges\u00a0from automation gone wrong, not just from deliberate, state-level cyber warfare.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.theregister.com\/2026\/02\/03\/autonomous_cyberattacks_not_real_yet\/\"><span data-contrast=\"none\">https:\/\/www.theregister.com\/2026\/02\/03\/autonomous_cyberattacks_not_real_yet\/<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>A new\u00a0International AI Safety Report\u00a0finds that AI agents are not yet capable of launching fully autonomous, end-to-end cyberattacks. However, they are already playing a meaningful role in\u00a0assisting\u00a0cybercriminals across multiple stages of the attack chain, from vulnerability discovery to malware development.\u00a0 The second annual report concludes that AI systems have become significantly more effective at automating [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":118288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488,1636,1646,1538,1716],"class_list":["post-118286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai","tag-ai-agents","tag-cyberattacks","tag-cybersecurity","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet - Eastgate Software<\/title>\n<meta name=\"description\" content=\"AI agents can\u2019t run end-to-end cyberattacks alone, but new research shows they already help criminals scan vulnerabilities, write malware.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet\" \/>\n<meta property=\"og:description\" content=\"AI agents can\u2019t run end-to-end cyberattacks alone, but new research shows they already help criminals scan vulnerabilities, write malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/ai-agents-arent-fully-autonomous-hackers-yet\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-05T03:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:20:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet\",\"datePublished\":\"2026-02-05T03:00:18+00:00\",\"dateModified\":\"2026-04-01T08:20:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/\"},\"wordCount\":299,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Ai\",\"AI Agents\",\"Cyberattacks\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/\",\"name\":\"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2026-02-05T03:00:18+00:00\",\"dateModified\":\"2026-04-01T08:20:22+00:00\",\"description\":\"AI agents can\u2019t run end-to-end cyberattacks alone, but new research shows they already help criminals scan vulnerabilities, write malware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-arent-fully-autonomous-hackers-yet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet - Eastgate Software","description":"AI agents can\u2019t run end-to-end cyberattacks alone, but new research shows they already help criminals scan vulnerabilities, write malware.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet","og_description":"AI agents can\u2019t run end-to-end cyberattacks alone, but new research shows they already help criminals scan vulnerabilities, write malware.","og_url":"https:\/\/wp.eastgate-software.com\/de\/ai-agents-arent-fully-autonomous-hackers-yet\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-02-05T03:00:18+00:00","article_modified_time":"2026-04-01T08:20:22+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet","datePublished":"2026-02-05T03:00:18+00:00","dateModified":"2026-04-01T08:20:22+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/"},"wordCount":299,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1","keywords":["Ai","AI Agents","Cyberattacks","cybersecurity","malware"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/","url":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/","name":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1","datePublished":"2026-02-05T03:00:18+00:00","dateModified":"2026-04-01T08:20:22+00:00","description":"AI agents can\u2019t run end-to-end cyberattacks alone, but new research shows they already help criminals scan vulnerabilities, write malware.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-arent-fully-autonomous-hackers-yet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"AI Agents Aren\u2019t Fully Autonomous Hackers \u2014 Yet"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-4.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uLQ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/118286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=118286"}],"version-history":[{"count":4,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/118286\/revisions"}],"predecessor-version":[{"id":119530,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/118286\/revisions\/119530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/118288"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=118286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=118286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=118286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}