We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Google Calendar Invites Can Trigger ChatGPT Data Leaks

Google Calendar Invites Can Trigger ChatGPT Data Leaks
Author Image Andrea Miliani
Andrea Miliani Published on September 18, 2025 Cybersecurity Researcher

Security researcher Eito Miyamura shared a post on the social media platform X last week demonstrating how it is possible to prompt-inject ChatGPT through Google Calendar invites. The cybersecurity expert exploited OpenAI’s new feature for Pro subscribers, which links ChatGPT to platforms such as Gmail and Google Calendar, enabling attackers to exfiltrate private data.

According to the post shared by Miyamura on September 12, malicious hackers can inject a jailbreak prompt into Google Calendar invites and make ChatGPT exfiltrate private information, even if the user hasn’t accepted the invitation.

“We just got ChatGPT to leak private email data to an attacker,” said Miyamura in a video. “And the craziest part is all they needed was your email address.”

Miyamura explained that after OpenAI added full support for Model Context Protocol (MPC) last week, allowing productivity tools to connect, it also enabled the AI agent to follow an attacker’s commands.

In three steps, the cybersecurity experts outlined how attackers could exploit the system. First, they send the victim a Google Calendar invite including the jailbreak prompt. Next, they wait for the user to use the new feature and ask ChatGPT about the upcoming events or request help planning their day. By asking the AI agent to access its Calendar, the victim makes ChatGPT read the malicious invite and respond to the attacker’s commands.

“For now, OpenAI only made MCPs available in ‘developer mode’, and requires manual human approvals for every session, but decision fatigue is a real thing, and normal people will just trust the AI without knowing what to do and click approve, approve, approve,” added Miyamura.

This is not the first security concern raised about ChatGPT agents. A few weeks ago, users revealed that the AI system was able to bypass Cloudflare’s “I Am Not a Robot” verification, sparking both technical and philosophical debate.

About the Author

  • Author Image Andrea Miliani
  • Andrea Miliani Cybersecurity Researcher

Andrea is a seasoned tech journalist with a growing passion for cybersecurity, covering cyberattacks, AI breakthroughs, and the latest trends shaping the future of technology.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Special characters are not allowed in the Name field

Please enter a valid email address