• About Us
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
Technology Hive
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
Technology Hive
No Result
View All Result
Home Technology

Security Lapses in AI Development

Linda Torries – Tech Writer & Digital Trends Analyst by Linda Torries – Tech Writer & Digital Trends Analyst
November 11, 2025
in Technology
0
Security Lapses in AI Development
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Introduction to AI Security Risks

According to Wiz, the race among AI companies is causing many to overlook basic security hygiene practices. This oversight has significant implications, as 65 percent of the 50 leading AI firms analyzed had leaked verified secrets on GitHub. The exposures include API keys, tokens, and sensitive credentials, often buried in code repositories that standard security tools do not check.

The Problem of Leaked Secrets

Glyn Morgan, Country Manager for UK&I at Salt Security, described this trend as a preventable and basic error. “When AI firms accidentally expose their API keys they lay bare a glaring avoidable security failure,” he said. This is particularly concerning because it provides attackers with a "golden ticket" to systems, data, and models, effectively sidestepping the usual defensive layers.

Supply Chain Security Risks

The problem extends beyond internal development teams; as enterprises increasingly partner with AI startups, they may inherit their security posture. The researchers warn that some of the leaks they found “could have exposed organisational structures, training data, or even private models.” The financial stakes are considerable, with the companies analyzed with verified leaks having a combined valuation of over $400 billion.

Examples of Leaks

The report provides examples of the risks, including:

  • LangChain, which was found to have exposed multiple Langsmith API keys, some with permissions to manage the organisation and list its members.
  • An enterprise-tier API key for ElevenLabs discovered sitting in a plaintext file.
  • An unnamed AI 50 company had a HuggingFace token exposed in a deleted code fork, allowing access to about 1K private models.

The Limitations of Traditional Security Scanning

The Wiz report suggests this problem is so prevalent because traditional security scanning methods are no longer sufficient. Relying on basic scans of a company’s main GitHub repositories is a “commoditised approach” that misses the most severe risks. The researchers describe the situation as an “iceberg” where the most obvious risks are visible, but the greater danger lies “below the surface.”

Advanced Scanning Methodology

To find these hidden risks, the researchers adopted a three-dimensional scanning methodology they call “Depth, Perimeter, and Coverage”:

  • Depth: Analyzing the full commit history, commit history on forks, deleted forks, workflow logs, and gists—areas most scanners “never touch.”
  • Perimeter: Expanding the scan beyond the core company organisation to include organisation members and contributors.
  • Coverage: Looking for new AI-related secret types that traditional scanners often miss, such as keys for platforms like WeightsAndBiases, Groq, and Perplexity.

Immediate Action Items

Wiz’s findings serve as a warning for enterprise technology executives, highlighting three immediate action items for managing both internal and third-party security risk:

  1. Security leaders must treat their employees as part of their company’s attack surface, creating a Version Control System (VCS) member policy.
  2. Internal secret scanning must evolve beyond basic repository checks, adopting the “Depth, Perimeter, and Coverage” mindset.
  3. This level of scrutiny must be extended to the entire AI supply chain, with CISOs probing their secrets management and vulnerability disclosure practices.

Conclusion

The central message for enterprises is that the tools and platforms defining the next generation of technology are being built at a pace that often outstrips security governance. As Wiz concludes, “For AI innovators, the message is clear: speed cannot compromise security”. For the enterprises that depend on that innovation, the same warning applies.

FAQs

  • Q: What is the main issue with AI companies in terms of security?
    A: Many AI companies overlook basic security hygiene practices, leading to leaked secrets such as API keys and sensitive credentials on platforms like GitHub.
  • Q: Why are traditional security scanning methods insufficient?
    A: They do not scan deeply enough, missing areas like full commit histories and deleted forks, and they do not cover the broader perimeter of contributors and new AI-related secret types.
  • Q: What should companies do to address these security risks?
    A: Implement a comprehensive scanning methodology that includes depth, perimeter, and coverage, and extend scrutiny to the entire AI supply chain, including employee practices and vendor security postures.
Previous Post

Moonshot AI Outperforms GPT-5 and Claude at a Fraction of the Cost

Next Post

Scaling GenAI Applications to Millions of Users

Linda Torries – Tech Writer & Digital Trends Analyst

Linda Torries – Tech Writer & Digital Trends Analyst

Linda Torries is a skilled technology writer with a passion for exploring the latest innovations in the digital world. With years of experience in tech journalism, she has written insightful articles on topics such as artificial intelligence, cybersecurity, software development, and consumer electronics. Her writing style is clear, engaging, and informative, making complex tech concepts accessible to a wide audience. Linda stays ahead of industry trends, providing readers with up-to-date analysis and expert opinions on emerging technologies. When she's not writing, she enjoys testing new gadgets, reviewing apps, and sharing practical tech tips to help users navigate the fast-paced digital landscape.

Related Posts

Building and Orchestrating Multi-Agent Systems with ADK
Technology

Building and Orchestrating Multi-Agent Systems with ADK

by Linda Torries – Tech Writer & Digital Trends Analyst
November 14, 2025
Building Multi-Agent Systems with LangGraph
Technology

Building Multi-Agent Systems with LangGraph

by Linda Torries – Tech Writer & Digital Trends Analyst
November 14, 2025
Designing Memory, Building Agents, and the Rise of Multimodal AI
Technology

Designing Memory, Building Agents, and the Rise of Multimodal AI

by Linda Torries – Tech Writer & Digital Trends Analyst
November 14, 2025
Handling Imbalanced Datasets with SMOTE in Machine Learning
Technology

Handling Imbalanced Datasets with SMOTE in Machine Learning

by Linda Torries – Tech Writer & Digital Trends Analyst
November 13, 2025
Google Introduces Conversational Shopping and Ads in AI Mode Search
Technology

Google Introduces Conversational Shopping and Ads in AI Mode Search

by Linda Torries – Tech Writer & Digital Trends Analyst
November 13, 2025
Next Post
Scaling GenAI Applications to Millions of Users

Scaling GenAI Applications to Millions of Users

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Articles

DeepSeek-V3: Understanding Multi-Token Prediction

DeepSeek-V3: Understanding Multi-Token Prediction

April 22, 2025
12 Days of Shipmas: What OpenAI’s Festive Campaign Reveals About the AI Arms Race

12 Days of Shipmas: What OpenAI’s Festive Campaign Reveals About the AI Arms Race

February 26, 2025
AI Efficiency Creates New Tasks

AI Efficiency Creates New Tasks

May 2, 2025

Browse by Category

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology
Technology Hive

Welcome to Technology Hive, your go-to source for the latest insights, trends, and innovations in technology and artificial intelligence. We are a dynamic digital magazine dedicated to exploring the ever-evolving landscape of AI, emerging technologies, and their impact on industries and everyday life.

Categories

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology

Recent Posts

  • Building and Orchestrating Multi-Agent Systems with ADK
  • Building Multi-Agent Systems with LangGraph
  • Designing Memory, Building Agents, and the Rise of Multimodal AI
  • Handling Imbalanced Datasets with SMOTE in Machine Learning
  • Unveiling AI Secrets with OpenAI’s Latest LLM

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

© Copyright 2025. All Right Reserved By Technology Hive.

No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • AI in Healthcare
  • AI Regulations & Policies
  • Business
  • Cloud Computing
  • Ethics & Society
  • Deep Learning

© Copyright 2025. All Right Reserved By Technology Hive.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?