2 Sources
2 Sources
[1]
Amazon Is Using Specialized AI Agents for Deep Bug Hunting
As generative AI pushes the speed of software development, it is also enhancing the ability of digital attackers to carry out financially motivated or state-backed hacks. This means that security teams at tech companies have more code than ever to review while dealing with even more pressure from bad actors. On Monday, Amazon will publish details for the first time of an internal system known as Autonomous Threat Analysis (ATA), which the company has been using to help its security teams proactively identify weaknesses in its platforms, perform variant analysis to quickly search for other, similar flaws, and then develop remediations and detection capabilities to plug holes before attackers find them. ATA was born out of an internal Amazon hackathon in August 2024, and security team members say that it has grown into a crucial tool since then. The key concept underlying ATA is that it isn't a single AI agent developed to comprehensively conduct security testing and threat analysis. Instead, Amazon developed multiple specialized AI agents that compete against each other in two teams to rapidly investigate real attack techniques and different ways they could be used against Amazon's systems -- and then propose security controls for human review. "The initial concept was aimed to address a critical limitation in security testing -- limited coverage and the challenge of keeping detection capabilities current in a rapidly evolving threat landscape," Steve Schmidt, Amazon's chief security officer, tells WIRED. "Limited coverage means you can't get through all of the software or you can't get to all of the applications because you just don't have enough humans. And then it's great to do an analysis of a set of software, but if you don't keep the detection systems themselves up to date with the changes in the threat landscape, you're missing half of the picture." As part of scaling its use of ATA, Amazon developed special "high-fidelity" testing environments that are deeply realistic reflections of Amazon's production systems, so ATA can both ingest and produce real telemetry for analysis. The company's security teams also made a point to design ATA so every technique it employs, and detection capability it produces, is validated with real, automatic testing and system data. Red team agents that are working on finding attacks that could be used against Amazon's systems execute actual commands in ATA's special test environments that produce verifiable logs. Blue team, or defense-focused agents, use real telemetry to confirm whether the protections they are proposing are effective. And anytime an agent develops a novel technique, it also pulls time-stamped logs to prove that its claims are accurate. This verifiability reduces false positives, Schmidt says, and acts as "hallucination management." Because the system is built to demand certain standards of observable evidence, Schmidt claims that "hallucinations are architecturally impossible."
[2]
Amazon details internal ATA cybersecurity automation system - SiliconANGLE
Amazon details internal ATA cybersecurity automation system Amazon.com Inc. has shared details about an internally developed artificial intelligence system it uses to find vulnerabilities in its infrastructure. The system is known as Autonomous Threat Analysis, or ATA for short, Wired reported today. Amazon engineers developed it during an internal hackathon. Scanning a large technology environment for vulnerabilities is a labor-intensive task. The process of fixing those vulnerabilities and checking that the patches work as expected can likewise take a significant amount of time. According to Wired, Amazon developed ATA to speed up the workflow. The company says that the system can test more than 200 hacking methods in 90 minutes. ATA is powered by two groups of AI agents. The first ensemble is responsible for finding cybersecurity flaws. The other agent group, in turn, comes up with ways to mitigate the vulnerabilities discovered by the first group. Furthermore, the agents test the suggested remediation methods to determine if they would work in production. According to Wired, Amazon developed a simulated version of its internal technology environment for ATA. The test environment reportedly enables the system to run "actual commands" of the kind hackers might use to carry out a cyberattack. During cyberattack simulations, ATA generates telemetry that engineers can use to verify the accuracy of the AI agents' output. Amazon says one of the tasks that the system speeds up is variant analysis. That's the process of identifying whether a vulnerability that affects one application might also be present in other workloads. The task is difficult to perform manually because the technical properties of a vulnerability often vary across the impacted systems. Vulnerability variations can emerge when there are snippets of code that perform the same task, but in different ways. For example, two form submission pages might each include a filter that blocks malicious uploads. Even if the two forms' respective filters are implemented in different programming languages, they might both include a flaw that lets SQL injections through. Variation analysis uncovers such issues. Many cyberattacks are carried out using a shell, a command line interface that provides access to operating system components. Usually, hackers use a malicious server to request access to a targeted system's shell. In some cases, they take the opposite approach: they first infect the targeted system and then have it establish a connection to a malicious server. Such cyberattacks are known as reverse shell attacks. Amazon engineers had ATA test Python-based reverse shell tactics during an internal project. The system reportedly found several potential vulnerabilities. Furthermore, it proposed detections against the vulnerabilities that proved to be 100% effective. A detection is a snippet of code that can identify a narrow set of cyberattacks.
Share
Share
Copy Link
Amazon has revealed details of its internal Autonomous Threat Analysis (ATA) system, which uses competing AI agents to proactively hunt for security vulnerabilities and develop countermeasures. The system emerged from a 2024 hackathon and can test over 200 hacking methods in just 90 minutes.
Amazon has publicly disclosed details of its groundbreaking internal cybersecurity system called Autonomous Threat Analysis (ATA), which represents a significant advancement in automated vulnerability detection and remediation. The system, which originated from an internal Amazon hackathon in August 2024, has rapidly evolved into a critical security tool that can test more than 200 hacking methods in just 90 minutes
1
.
Source: Wired
"The initial concept was aimed to address a critical limitation in security testing -- limited coverage and the challenge of keeping detection capabilities current in a rapidly evolving threat landscape," explains Steve Schmidt, Amazon's chief security officer. The system addresses two fundamental challenges: insufficient human resources to review all software and applications, and the difficulty of maintaining up-to-date detection systems in a rapidly changing threat environment
1
.Unlike traditional single-agent AI systems, ATA employs a unique architecture featuring multiple specialized AI agents organized into two competing teams. The first ensemble, functioning as a red team, focuses on identifying cybersecurity flaws and testing various attack techniques against Amazon's systems. The second group operates as a blue team, developing mitigation strategies for discovered vulnerabilities and testing the effectiveness of proposed remediation methods
2
.
Source: SiliconANGLE
This competitive approach ensures comprehensive coverage of potential attack vectors while simultaneously developing robust defense mechanisms. The red team agents execute actual commands in ATA's specialized testing environments, producing verifiable logs that demonstrate the validity of their findings. Meanwhile, blue team agents use real telemetry data to confirm whether their proposed protections would be effective in production environments
1
.To maximize the system's effectiveness, Amazon developed sophisticated "high-fidelity" testing environments that serve as deeply realistic reflections of the company's production systems. These environments enable ATA to both ingest and produce genuine telemetry for analysis, ensuring that all testing occurs under conditions that closely mirror real-world scenarios
1
.The system's architecture incorporates rigorous verification standards, requiring every technique employed and detection capability produced to be validated through automatic testing and system data. This approach significantly reduces false positives and serves as what Schmidt calls "hallucination management." The demand for observable evidence makes "hallucinations architecturally impossible," according to Amazon's security leadership
1
.Related Stories
One of ATA's most valuable features is its ability to perform variant analysis, a complex process that identifies whether vulnerabilities affecting one application might also exist in other systems. This capability addresses a significant challenge in manual security testing, where technical properties of vulnerabilities often vary across different systems, making comprehensive analysis extremely time-consuming
2
.The system excels at identifying vulnerabilities that emerge from code snippets performing similar tasks through different implementations. For instance, two form submission pages might each include filters blocking malicious uploads, but if implemented in different programming languages, both might contain similar flaws allowing SQL injections to pass through undetected
2
.During internal testing focused on Python-based reverse shell tactics, ATA demonstrated exceptional performance by identifying several potential vulnerabilities and proposing detection mechanisms that proved 100% effective. These detections consist of code snippets designed to identify specific sets of cyberattacks, providing targeted protection against identified threats
2
.Summarized by
Navi
11 Nov 2025•Technology

04 Aug 2025•Technology

03 Nov 2025•Technology

1
Business and Economy

2
Technology

3
Policy and Regulation
