{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/unit42.paloaltonetworks.com\/es-la\/","author_name":"Jay Chen","author_url":"https:\/\/unit42.paloaltonetworks.com\/es-la\/author\/jaychenpaloaltonetworks-com\/","title":"Cuando los agentes de IA se rebelan: ataque de contrabando de sesiones de agentes en sistemas A2A","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"EOwJVtSJW8\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/es-la\/agent-session-smuggling-in-agent2agent-systems\/\">Cuando los agentes de IA se rebelan: ataque de contrabando de sesiones de agentes en sistemas A2A<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unit42.paloaltonetworks.com\/es-la\/agent-session-smuggling-in-agent2agent-systems\/embed\/#?secret=EOwJVtSJW8\" width=\"600\" height=\"338\" title=\"\u00abCuando los agentes de IA se rebelan: ataque de contrabando de sesiones de agentes en sistemas A2A\u00bb \u2014 Unit 42\" data-secret=\"EOwJVtSJW8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/04_Tutorial_Category_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"El contrabando de sesiones de agentes es una t\u00e9cnica novedosa en la que se hace un uso indebido de la comunicaci\u00f3n entre agentes de IA. Mostramos dos ejemplos de prueba de concepto."}