Bedrock attack vectors exploit permissions and integrations, enabling data theft, agent hijacking, and system compromise at scale.