Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecurityRetail/Restaurants/Convenience

Autonomous Shopping Agents Bring Innovation — and New Security Risks

By James White
Rendered shopping cart with boxes and bags

Shutter Speed via Unsplash

June 17, 2025

Goodbye ecommerce, hello AI-commerce. As Google, Visa, and Mastercard unveil AI agents for internet shopping, it is only a matter of time until empowered agents routinely browse, select, and buy goods online without step-by-step human intervention.

Once the customer sets the rules for how and when payments occur, verified agents can take over using tokenized technology. Done properly, these payments have the potential to unlock adoption of and trust in agent-based — so-called ‘agentic’ — systems by individuals and enterprises.

Though they don’t always get the credit, payments companies have a track record of innovation that reaches deep into the global economy. In many markets, consumers now take for granted that they don’t need to carry cash or even cards — they just tap a phone or smartwatch to pay. 

Even by those standards, handing over autonomy to an agent will involve a leap of faith, and some serious assurances about security. All aspects of payments are attractive to threat actors; aside from the potential to steal funds, poorly secured systems offer opportunities to access payments data and related personally identifiable information that can be held to ransom.

The consequences of a breach can be very costly. The recent, highly-publicized, attack on Coinbase — a low-tech breach allegedly involving payments to support agents for inside information — will cost up to $400 million to remediate, even though the company insists no customer funds were stolen. 

Now imagine the damage that could be done by an attack on an agentic payments system that operates under the banner of a household name brand. As well as financial cost and reputation damage, a breach would represent a major setback for the nascent agent-based technology.

The challenge of securing agentic systems is complicated by the very nature of agents. Put simply, an agent consists of three layers: a purpose; a ‘brain’, which is the underlying AI model(s); and permitted access to tools and data sources. 

The agent carries out its purpose by sending queries to its brain and taking action to access the appropriate tools and data. The interactions between the layers open up entirely new attack surfaces so agents require protection at both the ‘thought’ stage, where they are thinking about what to do, and the ‘action’ stage, where they are interacting with tools to fulfill their purpose.

Giving an agent permission to carry out payments, even where information is encrypted or tokenized, raises the stakes considerably. There are several possible angles of attack to consider, including model man-in-the-middle (MITM) attacks and prompt injection attacks. 

A model MITM attack could occur at the agent thought stage, where a malicious actor inserts themselves between the legitimate parties in the transaction to alter or intercept data. With prompt injection attacks, meanwhile, the actual intent can be changed at the model interpretation stage, using malicious prompts to force the model to behave in unintended ways. 

In the broader sense, there are multiple potential attack vectors arising from the advent of agent payments. As agentic commerce gains ground, free or open-source payment agents may emerge, some of which will have deliberately been created for malicious activity. 

These could perform their advertised task, such as buying the latest sneakers on their release date, while simultaneously siphoning off payment information for other uses. Like age-old payment scams, these agents may be branded to look like legitimate and secure products. 

In addition, open-source agents that were built with good intent may be compromised by internal threat actors through actions such a malicious merge request or pull request in an open-source code base. Meanwhile, unsafe hosting of the model that powers the agent to think and act could lead to model traffic being intercepted and data being stolen.  

Beyond malicious attacks, there is the potential for errors. Models are often bad at handling math problems, so calculations could lead to under- or over-charging. A tool that interacts with a website to make payment may timeout and try again, leading to an accidental double payment.

These are all realistic security issues that may emerge, both for the first generation of payment agents and the ones that will inevitably follow. Understanding the agent threat is the first step to dealing with it; the best way to effectively scale up defenses is to properly understand the type and complexity of potential attacks and employ appropriate measures.

To build a security perimeter around agents accessing financial data, companies should ensure they employ models that rank highly on publicly-available safety scoreboards and are resilient to simulated attacks. This means putting agentic AI security in place, using security agents to red team their systems with simulated ‘agentic warfare’ attacks both pre- and post-production. 

This is not ‘one-and-done,’ however. Ongoing monitoring is a critical factor in maintaining a hard-won security posture. Businesses that take their own security and the security of their customers seriously must be prepared to continuously scan content at the thought and action stages of model interactions, particularly in such a sensitive area as payments. 

Finally, security leaders should ensure payments agents have layered authentication so requests originate from trusted sources. Installing both transaction limits and explainability frameworks, including provenance tracking to trace the origin of a decision back through the model’s logic, will assure greater accountability.

These actions will help to build all-important trust in AI-commerce and unlock the uptake and benefits of agentic solutions for shopping.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security retail cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

James white headshot

James White is President and CTO of CalypsoAI. Image courtesy of White

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Abstract rendered coding blocks

    Agentic AI Is Everywhere — So Are the Security Risks

    See More
  • Monitors with keyboard

    Mitigating the hidden risks of AI in security and SOCs

    See More
  • Generic Image for Cyber Security

    New Study Explores Security Risks in Office Laptop Use

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!