Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecurityRetail/Restaurants/Convenience

Autonomous Shopping Agents Bring Innovation — and New Security Risks

By James White
Rendered shopping cart with boxes and bags

Shutter Speed via Unsplash

June 17, 2025

Goodbye ecommerce, hello AI-commerce. As Google, Visa, and Mastercard unveil AI agents for internet shopping, it is only a matter of time until empowered agents routinely browse, select, and buy goods online without step-by-step human intervention.

Once the customer sets the rules for how and when payments occur, verified agents can take over using tokenized technology. Done properly, these payments have the potential to unlock adoption of and trust in agent-based — so-called ‘agentic’ — systems by individuals and enterprises.

Though they don’t always get the credit, payments companies have a track record of innovation that reaches deep into the global economy. In many markets, consumers now take for granted that they don’t need to carry cash or even cards — they just tap a phone or smartwatch to pay. 

Even by those standards, handing over autonomy to an agent will involve a leap of faith, and some serious assurances about security. All aspects of payments are attractive to threat actors; aside from the potential to steal funds, poorly secured systems offer opportunities to access payments data and related personally identifiable information that can be held to ransom.

The consequences of a breach can be very costly. The recent, highly-publicized, attack on Coinbase — a low-tech breach allegedly involving payments to support agents for inside information — will cost up to $400 million to remediate, even though the company insists no customer funds were stolen. 

Now imagine the damage that could be done by an attack on an agentic payments system that operates under the banner of a household name brand. As well as financial cost and reputation damage, a breach would represent a major setback for the nascent agent-based technology.

The challenge of securing agentic systems is complicated by the very nature of agents. Put simply, an agent consists of three layers: a purpose; a ‘brain’, which is the underlying AI model(s); and permitted access to tools and data sources. 

The agent carries out its purpose by sending queries to its brain and taking action to access the appropriate tools and data. The interactions between the layers open up entirely new attack surfaces so agents require protection at both the ‘thought’ stage, where they are thinking about what to do, and the ‘action’ stage, where they are interacting with tools to fulfill their purpose.

Giving an agent permission to carry out payments, even where information is encrypted or tokenized, raises the stakes considerably. There are several possible angles of attack to consider, including model man-in-the-middle (MITM) attacks and prompt injection attacks. 

A model MITM attack could occur at the agent thought stage, where a malicious actor inserts themselves between the legitimate parties in the transaction to alter or intercept data. With prompt injection attacks, meanwhile, the actual intent can be changed at the model interpretation stage, using malicious prompts to force the model to behave in unintended ways. 

In the broader sense, there are multiple potential attack vectors arising from the advent of agent payments. As agentic commerce gains ground, free or open-source payment agents may emerge, some of which will have deliberately been created for malicious activity. 

These could perform their advertised task, such as buying the latest sneakers on their release date, while simultaneously siphoning off payment information for other uses. Like age-old payment scams, these agents may be branded to look like legitimate and secure products. 

In addition, open-source agents that were built with good intent may be compromised by internal threat actors through actions such a malicious merge request or pull request in an open-source code base. Meanwhile, unsafe hosting of the model that powers the agent to think and act could lead to model traffic being intercepted and data being stolen.  

Beyond malicious attacks, there is the potential for errors. Models are often bad at handling math problems, so calculations could lead to under- or over-charging. A tool that interacts with a website to make payment may timeout and try again, leading to an accidental double payment.

These are all realistic security issues that may emerge, both for the first generation of payment agents and the ones that will inevitably follow. Understanding the agent threat is the first step to dealing with it; the best way to effectively scale up defenses is to properly understand the type and complexity of potential attacks and employ appropriate measures.

To build a security perimeter around agents accessing financial data, companies should ensure they employ models that rank highly on publicly-available safety scoreboards and are resilient to simulated attacks. This means putting agentic AI security in place, using security agents to red team their systems with simulated ‘agentic warfare’ attacks both pre- and post-production. 

This is not ‘one-and-done,’ however. Ongoing monitoring is a critical factor in maintaining a hard-won security posture. Businesses that take their own security and the security of their customers seriously must be prepared to continuously scan content at the thought and action stages of model interactions, particularly in such a sensitive area as payments. 

Finally, security leaders should ensure payments agents have layered authentication so requests originate from trusted sources. Installing both transaction limits and explainability frameworks, including provenance tracking to trace the origin of a decision back through the model’s logic, will assure greater accountability.

These actions will help to build all-important trust in AI-commerce and unlock the uptake and benefits of agentic solutions for shopping.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security retail cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

James white headshot

James White is President and CTO of CalypsoAI. Image courtesy of White

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Airport baggage check

    AI Agents and Holiday Travel: A New Fraud Frontier

    See More
  • New Study Explores Security Risks in Office Laptop Use

    See More
  • Abstract rendered coding blocks

    Agentic AI Is Everywhere — So Are the Security Risks

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing