SaaS News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

SaaS Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
SaaSNewsBilling Can Be Bypassed Using a Combo of Subagents with an Agent Definition
Billing Can Be Bypassed Using a Combo of Subagents with an Agent Definition
SaaSAI

Billing Can Be Bypassed Using a Combo of Subagents with an Agent Definition

•February 8, 2026
0
Hacker News
Hacker News•Feb 8, 2026

Companies Mentioned

GitHub

GitHub

Why It Matters

The vulnerability enables cost‑free consumption of high‑value AI models, threatening Copilot’s usage‑based revenue and exposing the risks of client‑side entitlement checks in SaaS AI services.

Key Takeaways

  • •Subagents can invoke premium models without billing
  • •Billing calculated only on initial model, not subagents
  • •Free model launches premium subagent, bypassing cost
  • •Fix: enforce server‑side billing per inference, not client
  • •Loop scripts can trigger hundreds of premium calls cheaply

Pulse Analysis

Microsoft Copilot’s recent billing bypass illustrates how flexible agent architectures can be weaponized. Researchers demonstrated that a conversation started with a free model—GPT‑5 Mini—can create a subagent whose definition points to an expensive model such as Opus 4.5. Because the platform only tallies the cost of the initial request, the premium model runs unchecked, delivering full‑fledged responses while the user’s account remains untouched. The exploit also leverages tool‑calling loops, allowing a single prompt to spawn a cascade of premium subagents that operate for hours without additional charges.

For enterprise customers and Microsoft alike, the flaw threatens both revenue and trust. Copilot’s pricing model relies on accurate metering of premium token usage; a loophole that lets users bypass fees undermines the economic rationale for premium tiers and could incentivize large‑scale abuse. Moreover, the issue exposes a broader architectural weakness: reliance on client‑side metadata—such as message types and agent configurations—to enforce entitlement. When the backend trusts these fields, malicious actors can craft payloads that appear legitimate while secretly draining costly resources.

Mitigating the problem requires moving entitlement enforcement to the server. Every inference, whether triggered directly or via a subagent, should be billed based on the resolved model at dispatch time. Treating tool calls like agent/runSubagent as first‑class billable operations, imposing server‑side caps on per‑session requests, and validating agent definitions against entitlement policies will close the loophole. Implementing automated regression tests that verify premium usage increments for subagent calls will further safeguard against future regressions, ensuring Copilot’s pricing remains fair and its platform secure.

Billing can be bypassed using a combo of subagents with an agent definition

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...