By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
AIModelKitAIModelKitAIModelKit
  • Home
  • News
    NewsShow More
    NAACP Lawsuit Claims Elon Musk’s xAI Pollutes Black Neighborhoods Near Memphis
    NAACP Lawsuit Claims Elon Musk’s xAI Pollutes Black Neighborhoods Near Memphis
    5 Min Read
    Scotiabank Canada: Embracing Artificial Intelligence for a Future-Ready Banking Experience
    Scotiabank Canada: Embracing Artificial Intelligence for a Future-Ready Banking Experience
    6 Min Read
    Google Launches Gemini Personal Intelligence Feature in India: What You Need to Know
    Google Launches Gemini Personal Intelligence Feature in India: What You Need to Know
    4 Min Read
    Sam Altman Targeted Again in Recent Attack: What You Need to Know
    Sam Altman Targeted Again in Recent Attack: What You Need to Know
    4 Min Read
    OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
    OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
    5 Min Read
  • Open-Source Models
    Open-Source ModelsShow More
    Pioneering the Future of Computer Use: Expanding Digital Frontiers
    Pioneering the Future of Computer Use: Expanding Digital Frontiers
    5 Min Read
    Protecting Cryptocurrency: How to Responsibly Disclose Quantum Vulnerabilities
    Protecting Cryptocurrency: How to Responsibly Disclose Quantum Vulnerabilities
    4 Min Read
    Boosting AI and XR Prototyping Efficiency with XR Blocks and Gemini
    Boosting AI and XR Prototyping Efficiency with XR Blocks and Gemini
    5 Min Read
    Transforming News Reports into Data Insights with Gemini: A Comprehensive Guide
    Transforming News Reports into Data Insights with Gemini: A Comprehensive Guide
    6 Min Read
    Enhancing Urban Safety: AI-Powered Flash Flood Forecasting Solutions for Cities
    Enhancing Urban Safety: AI-Powered Flash Flood Forecasting Solutions for Cities
    5 Min Read
  • Guides
    GuidesShow More
    Unlocking Vector Databases and Embeddings Using ChromaDB: A Comprehensive Guide on Real Python
    Unlocking Vector Databases and Embeddings Using ChromaDB: A Comprehensive Guide on Real Python
    4 Min Read
    Could AI Agents Become Your Next Security Threat?
    Could AI Agents Become Your Next Security Threat?
    6 Min Read
    Master Python Continuous Integration and Deployment with GitHub Actions: Take the Real Python Quiz
    Master Python Continuous Integration and Deployment with GitHub Actions: Take the Real Python Quiz
    3 Min Read
    Exploring the Role of Data Generalists: Why Range is More Important than Depth
    Exploring the Role of Data Generalists: Why Range is More Important than Depth
    6 Min Read
    Master Python Protocols: Take the Ultimate Quiz with Real Python
    Master Python Protocols: Take the Ultimate Quiz with Real Python
    4 Min Read
  • Tools
    ToolsShow More
    Optimizing Use-Case Based Deployments with SageMaker JumpStart
    Optimizing Use-Case Based Deployments with SageMaker JumpStart
    5 Min Read
    Safetensors Partners with PyTorch Foundation: Strengthening AI Development
    Safetensors Partners with PyTorch Foundation: Strengthening AI Development
    5 Min Read
    High Throughput Computer Use Agent: Understanding 12B for Optimal Performance
    High Throughput Computer Use Agent: Understanding 12B for Optimal Performance
    5 Min Read
    Introducing the First Comprehensive Healthcare Robotics Dataset and Essential Physical AI Models for Advancing Healthcare Robotics
    Introducing the First Comprehensive Healthcare Robotics Dataset and Essential Physical AI Models for Advancing Healthcare Robotics
    6 Min Read
    Creating Native Multimodal Agents with Qwen 3.5 VLM on NVIDIA GPU-Accelerated Endpoints
    Creating Native Multimodal Agents with Qwen 3.5 VLM on NVIDIA GPU-Accelerated Endpoints
    5 Min Read
  • Events
    EventsShow More
    Navigating the ESSER Cliff: Key Reasons Education Company Leaders are Attending the 2026 EdExec Summit
    Navigating the ESSER Cliff: Key Reasons Education Company Leaders are Attending the 2026 EdExec Summit
    6 Min Read
    Exploring National Robotics Week: Key Physical AI Research Breakthroughs and Essential Resources
    Exploring National Robotics Week: Key Physical AI Research Breakthroughs and Essential Resources
    5 Min Read
    Developing a Comprehensive Four-Part Professional Development Series on AI Education
    Developing a Comprehensive Four-Part Professional Development Series on AI Education
    6 Min Read
    NVIDIA and Thinking Machines Lab Forge Strategic Gigawatt-Scale Partnership for Long-Term Innovation
    NVIDIA and Thinking Machines Lab Forge Strategic Gigawatt-Scale Partnership for Long-Term Innovation
    5 Min Read
    ABB Robotics Utilizes NVIDIA Omniverse for Scalable Industrial-Grade Physical AI Solutions
    ABB Robotics Utilizes NVIDIA Omniverse for Scalable Industrial-Grade Physical AI Solutions
    5 Min Read
  • Ethics
    EthicsShow More
    Examining Demographic Bias in LLM-Generated Targeted Messages: An Audit Study
    Examining Demographic Bias in LLM-Generated Targeted Messages: An Audit Study
    4 Min Read
    Meta Faces Warning: Facial Recognition Glasses Could Empower Sexual Predators
    Meta Faces Warning: Facial Recognition Glasses Could Empower Sexual Predators
    5 Min Read
    How Increased Job Commodification Makes Your Role More Susceptible to AI: Insights from Online Freelancing
    How Increased Job Commodification Makes Your Role More Susceptible to AI: Insights from Online Freelancing
    6 Min Read
    Exclusive Jeff VanderMeer Story & Unreleased AI Models: The Download You Can’t Miss
    Exclusive Jeff VanderMeer Story & Unreleased AI Models: The Download You Can’t Miss
    5 Min Read
    Exploring Psychological Learning Paradigms: Their Impact on Shaping and Constraining Artificial Intelligence
    Exploring Psychological Learning Paradigms: Their Impact on Shaping and Constraining Artificial Intelligence
    4 Min Read
  • Comparisons
    ComparisonsShow More
    Enhancing Gradient Concentration to Distinguish Between SFT and RL Data
    Enhancing Gradient Concentration to Distinguish Between SFT and RL Data
    5 Min Read
    Exploring the Behavioral Effects of Emotion-Inspired Mechanisms in Large Language Models: Insights from Anthropic Research
    4 Min Read
    Understanding Abstention Through Selective Help-Seeking: A Comprehensive Model
    Understanding Abstention Through Selective Help-Seeking: A Comprehensive Model
    5 Min Read
    Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
    Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
    4 Min Read
    Google Launches Gemma 4: Emphasizing Local-First, On-Device AI Inference for Enhanced Performance
    Google Launches Gemma 4: Emphasizing Local-First, On-Device AI Inference for Enhanced Performance
    5 Min Read
Search
  • Privacy Policy
  • Terms of Service
  • Contact Us
  • FAQ / Help Center
  • Advertise With Us
  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events
© 2025 AI Model Kit. All Rights Reserved.
Reading: Security Gaps Exposed in the Global AI Race: Addressing Critical Vulnerabilities
Share
Notification Show More
Font ResizerAa
AIModelKitAIModelKit
Font ResizerAa
  • 🏠
  • 🚀
  • 📰
  • 💡
  • 📚
  • ⭐
Search
  • Home
  • News
  • Models
  • Guides
  • Tools
  • Ethics
  • Events
  • Comparisons
Follow US
  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events
© 2025 AI Model Kit. All Rights Reserved.
AIModelKit > News > Security Gaps Exposed in the Global AI Race: Addressing Critical Vulnerabilities
News

Security Gaps Exposed in the Global AI Race: Addressing Critical Vulnerabilities

aimodelkit
Last updated: November 11, 2025 9:14 pm
aimodelkit
Share
Security Gaps Exposed in the Global AI Race: Addressing Critical Vulnerabilities
SHARE

The Urgent Need for Enhanced Security Practices in the AI Sector

As the race among AI companies heats up, a concerning trend has emerged: many organizations are ignoring foundational cybersecurity hygiene, leading to significant vulnerabilities. A recent report by Wiz highlights that 65% of the top 50 AI firms analyzed have leaked verified secrets via platforms like GitHub. This situation poses severe risks, with potentially damaging ramifications for companies and their clients.

Contents
  • Exposed Secrets: A Growing Concern
  • Supply Chain Security Risks
  • Inadequacies of Traditional Security Scanning
    • Depth
    • Perimeter
    • Coverage
  • Security Maturity Gaps
  • Immediate Action Items for AI Firms

Exposed Secrets: A Growing Concern

Among the types of sensitive information at risk, API keys, tokens, and credentials have been found hidden within code repositories—often overlooked by standard security tools. Glyn Morgan, Country Manager for UK&I at Salt Security, aptly describes these lapses as preventable errors that clearly demonstrate a lack of effective governance and security configurations. According to Morgan, accidentally exposing API keys presents "a glaring avoidable security failure" that invites attackers to exploit otherwise secured systems.

Supply Chain Security Risks

Wiz’s report sheds light on the expanding complexities of supply chain security risks in the AI landscape. Given the increasing collaboration between established enterprises and innovative AI startups, companies may inadvertently adopt the security flaws of their partners. The leaks discovered could potentially expose organizational structures, proprietary training data, and even proprietary AI models.

The financial stakes for these firms are substantial, with a combined valuation exceeding $400 billion. Examples of significant hackers’ targets include:

  • LangChain, which exposed multiple Langsmith API keys, some granting access to manage the organization and list its members.
  • An enterprise-tier API key for ElevenLabs was discovered simply sitting in a plaintext file, creating a significant vulnerability.
  • An unnamed AI 50 company had a HuggingFace token exposed in a deleted code fork, allowing access to around 1,000 private models. This same company also leaked keys for WeightsAndBiases, putting training data at risk.

Inadequacies of Traditional Security Scanning

Wiz’s findings emphasize that conventional security scanning techniques are no longer sufficient. The report criticizes the reliance on basic scans of a company’s main GitHub repositories as a "commoditized approach," which fails to uncover critical risks.

More Read

OpenAI Secures 0 Million U.S. Defense Contract: Key Details and Implications
OpenAI Secures $200 Million U.S. Defense Contract: Key Details and Implications
India Poised to Harness US Tech Giants’ Innovations at Delhi Summit: A Focus on AI Advancements
OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
Tinder Leverages AI to Personalize User Experience Using Camera Roll Photos
How GPT-5’s Improved Features Make It More User-Friendly

Researchers liken the situation to an iceberg, where the most visible issues represent only a fraction of the actual risks. To effectively identify hidden threats, Wiz implemented a unique three-dimensional scanning methodology known as Depth, Perimeter, and Coverage:

Depth

The depth scan scrutinizes the entire commit history, including forks, deleted code, and workflow logs—areas typically ignored by standard scanners.

Perimeter

The perimeter scanning encompasses not only the primary company organization but also its members and contributors. Individual contributors may inadvertently expose company-related secrets in their own public repositories. Wiz’s team utilized techniques to trace code contributors and identify related accounts on platforms like HuggingFace and npm.

Coverage

Finally, the coverage aspect of the scan focuses on identifying new AI-related secret types often overlooked by conventional detection methods, such as keys for services like WeightsAndBiases, Groq, and Perplexity.

Security Maturity Gaps

The expanded attack surface showcased in the report raises alarms, particularly given the evident lack of security maturity in numerous fast-evolving companies. Alarmingly, when efforts were made to disclose the leaks, nearly half of the notifications went unanswered or failed to reach the intended recipients. Many firms lack official disclosure channels, indicating poor responsiveness to security issues.

Immediate Action Items for AI Firms

Wiz offers critical recommendations for enterprise technology executives to bolster their security infrastructures amid emerging risks. These include:

  1. Incorporating Security Awareness During Onboarding

    • Security leaders should treat employees as integral to their organization’s attack surface. A well-defined Version Control System (VCS) member policy should be established during onboarding. This policy must include mandatory practices such as multi-factor authentication for personal accounts and a strict separation between personal and official activities on platforms like GitHub.
  2. Evolving Internal Secret Scanning

    • Companies need to move beyond basic repository checks for internal secret scanning. It is crucial to adopt the Depth, Perimeter, and Coverage approach to uncover hidden threats to safeguard the organization effectively.
  3. Extending Scrutiny to the AI Supply Chain
    • When evaluating potential tools from AI vendors, Chief Information Security Officers (CISOs) must inquire about the vendors’ secret management and vulnerability disclosure practices. The report notes a trend among AI service providers leaking their own API keys, calling for prioritized detection of their specific secret types.

The current landscape underscores a critical reality: the tools and technologies driving the next generation of innovation are often developing at a pace that outstrips security governance. For leaders within AI sectors, it’s imperative to realize that speed must not compromise security; for the enterprises relying on this rapid progression, the same cautionary principle holds true.

By addressing gaps in security practices and enhancing governance measures, the AI community can better protect its assets and maintain trust with its users and partners.

Inspired by: Source

Stanford Study Reveals Risks of Seeking Personal Advice from AI Chatbots
Why the UK Seeks Anthropic’s Commitment to Non-Arming AI
Discover How Google Translate Enables Real-Time Audio Translations Directly in Your Headphones
Amazon Launches AI-Powered Smart Glasses for Enhanced Delivery Driver Efficiency
Exploring the Future of AI Agents: Insights on Trump’s Strategies to Safeguard U.S. Tech Companies Abroad

Sign Up For Daily Newsletter

Get AI news first! Join our newsletter for fresh updates on open-source models.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Previous Article Using Sentence Space Embedding for Enhanced Classification of Fake News Data Streams Using Sentence Space Embedding for Enhanced Classification of Fake News Data Streams
Next Article Essential Metrics for Evaluating Compositional Text-to-Image Generation Models Essential Metrics for Evaluating Compositional Text-to-Image Generation Models

Stay Connected

XFollow
PinterestPin
TelegramFollow
LinkedInFollow

							banner							
							banner
Explore Top AI Tools Instantly
Discover, compare, and choose the best AI tools in one place. Easy search, real-time updates, and expert-picked solutions.
Browse AI Tools

Latest News

NAACP Lawsuit Claims Elon Musk’s xAI Pollutes Black Neighborhoods Near Memphis
NAACP Lawsuit Claims Elon Musk’s xAI Pollutes Black Neighborhoods Near Memphis
News
Enhancing Gradient Concentration to Distinguish Between SFT and RL Data
Enhancing Gradient Concentration to Distinguish Between SFT and RL Data
Comparisons
Optimizing Use-Case Based Deployments with SageMaker JumpStart
Optimizing Use-Case Based Deployments with SageMaker JumpStart
Tools
Unlocking Vector Databases and Embeddings Using ChromaDB: A Comprehensive Guide on Real Python
Unlocking Vector Databases and Embeddings Using ChromaDB: A Comprehensive Guide on Real Python
Guides
//

Leading global tech insights for 20M+ innovators

Quick Link

  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events

Support

  • Privacy Policy
  • Terms of Service
  • Contact Us
  • FAQ / Help Center
  • Advertise With Us

Sign Up for Our Newsletter

Get AI news first! Join our newsletter for fresh updates on open-source models.

AIModelKitAIModelKit
Follow US
© 2025 AI Model Kit. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?