The Intake — Tuesday, May 19, 2026

On the substrate

Google launches Gemini Spark personal agent and Antigravity SDK at I/O 2026

Google blog (primary) TechCrunch SiliconANGLE

Gemini Spark is Google's new 24/7 personal AI agent. It runs on Gemini 3.5 Flash and the Antigravity harness. Google announced it at Google I/O 2026 on May 19. Google describes it as deeply integrated with Gmail and Docs, continuing to run even when the user's device is closed or locked. At launch it ships with connectors to Canva, OpenTable, and Instacart; MCP connections to GitHub and Notion are listed as coming. Google opened Spark to trusted testers immediately, with a wider beta for Google AI Ultra subscribers in the United States planned for the following week. Google also released the Antigravity SDK at the same event. The SDK gives developers programmatic access to the same Antigravity harness. Deployment is hosted on the operator's chosen infrastructure. Practitioners building with agents now have a documented path to the Antigravity harness — via the SDK, with deployment on their own infrastructure.

Cyera discloses Claw Chain, four chainable OpenClaw vulnerabilities patched in version 2026.4.22

Cyera (primary disclosure) The Hacker News eSecurity Planet

OpenClaw is an open-source platform for running autonomous AI agents. Cyera disclosed four chainable vulnerabilities in it on May 19, credited to researcher Vladimir Tokarev. The four CVEs are tracked as CVE-2026-44112 (CVSS 9.6), CVE-2026-44113 (CVSS 7.7), CVE-2026-44115 (CVSS 8.8), and CVE-2026-44118 (CVSS 7.8). Two of the four are TOCTOU race conditions in the OpenShell managed sandbox; the Cyera disclosure says they allow attackers to read and write outside the sandbox boundary. A third vulnerability bypasses the command allowlist by embedding shell expansion tokens inside a heredoc body. The fourth allows non-owner loopback clients to impersonate the owner and take over gateway and execution-environment configuration. OpenClaw shipped fixes in version 2026.4.22 on April 23, 2026. Cyera lists all prior releases as affected. Teams hosting agents on OpenClaw versions prior to 2026.4.22 are running infrastructure with four publicly documented, chainable vulnerabilities — two allowing sandbox escape and one allowing gateway takeover through loopback impersonation.