Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CISO Pay Increases 7% As Budget Growth Slows

November 13, 2025

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

November 13, 2025

Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta

November 13, 2025
Facebook X (Twitter) Instagram
Thursday, November 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»65% of Leading AI Companies Found With Verified Secrets Leaks
News

65% of Leading AI Companies Found With Verified Secrets Leaks

Team-CWDBy Team-CWDNovember 10, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new study has revealed that nearly two-thirds of leading private AI companies have leaked sensitive information on GitHub.

Wiz researchers examined 50 firms from the Forbes AI 50 list and confirmed that 65% had exposed verified secrets such as API keys, tokens and credentials. Collectively, the affected companies are valued at more than $400bn.

The research, published today, suggests that rapid innovation in artificial intelligence is outpacing basic cybersecurity practices. Even companies with minimal public repositories were found to have leaked information.

One firm with no public repositories and only 14 members still exposed secrets, while another with 60 public repositories avoided leaks entirely, likely due to stronger security practices.

Digging Below the Surface

To identify these exposures, the researchers said they expanded their scanning beyond traditional GitHub searches.

Wiz’s “Depth, Perimeter and Coverage” framework looked deeper into commit histories, deleted forks, gists and even contributors’ personal repositories.

This approach helped uncover secrets hidden in obscure or deleted parts of codebases that standard scanners often miss.

Among the most commonly leaked credentials were API keys from WeightsAndBiases, ElevenLabs and HuggingFace. Some of these could have allowed access to private training data or organizational information – critical assets for AI development.

Read more on AI security vulnerabilities: Critical Security Flaws Grow with AI Use, New Report Shows

Disclosure Challenges

While some companies, including LangChain and ElevenLabs, acted swiftly to fix their exposures, the broader disclosure landscape remains uneven. Nearly half of all disclosures either went unanswered or failed to reach their targets.

Many organizations lacked an official process for receiving and responding to vulnerability reports, highlighting a significant gap in corporate security readiness.

Examples include LangChain API keys found in Python and Jupyter files, and an ElevenLabs key discovered in a plaintext configuration file. Another unnamed AI 50 firm was found to have a HuggingFace token in a deleted fork, exposing roughly 1000 private models.

Strengthening Defenses

To counter these dangers, Wiz researchers urge AI startups to:

  • Implement mandatory secrets scanning for all public repositories

  • Establish clear disclosure channels for external researchers

  • Develop proprietary scanners for their unique secret types

The report concludes that as AI development accelerates, so must its security practices.

“Speed cannot compromise security,” Wiz said.

“For teams building the future of AI, both must move together.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
Next Article China-Aligned UTA0388 Uses AI Tools in Global Phishing Campaigns
Team-CWD
  • Website

Related Posts

News

CISO Pay Increases 7% As Budget Growth Slows

November 13, 2025
News

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

November 13, 2025
News

Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta

November 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.