{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreicg54qpiabsfxagnnsr3ekz6jnxmesro3vk6p3t6aginfe3aonkpq",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mkkmy2rgomh2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreicakgkokbq3okqsjuq6v3a5ro7szrdcnt4wk65blzveztmnaoosym"
    },
    "mimeType": "image/jpeg",
    "size": 138708
  },
  "path": "/2026/04/microsoft-patches-entra-id-role-flaw.html",
  "publishedAt": "2026-04-28T06:37:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort.\nAgent ID Administrator is a privileged built-in role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent's identity lifecycle operations in a",
  "title": "Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover"
}