FOMO DailyFOMO DailyFOMO Daily
Font ResizerAa
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Reading: AI Companies Leak Sensitive Data in GitHub Repositories, Says Wiz
Share
Font ResizerAa
FOMO DailyFOMO Daily
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Search
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Copyright © 2026 FOMO Daily - All Rights Reserved.

AI Companies Leak Sensitive Data in GitHub Repositories, Says Wiz

How rapid AI innovation is outpacing cybersecurity — and what leaders must do before the next leak.

Miles Rowan
Last updated: November 12, 2025 10:50 pm
Miles Rowan
4 Min Read
Share
4 Min Read

A new cybersecurity study published by Wiz has found that the majority of the world’s top artificial intelligence companies are inadvertently exposing confidential information online, underscoring a growing disconnect between rapid innovation and basic security discipline.

According to the report, 65% of the 50 leading AI companies analyzed had leaked verified secrets on GitHub, including API keys, authentication tokens, and other sensitive credentials. Many of these exposures were buried deep within repositories or deleted forks areas rarely examined by standard scanning tools.

A Preventable Error

According to Glyn Morgan, the Country Manager for the UK & Ireland at Salt Security, the trend is both “glaring and avoidable.”

“When AI companies inadvertently leak their API keys, it points to a fundamental failure in governance and configuration,” he said. “It hands attackers a direct route into systems, models, and data while bypassing the usual defensive layers.”

The Wiz research underlines that these security oversights are far from isolated developer mistakes. As enterprises increasingly partner with AI startups, they become quite exposed to the same kinds of vulnerabilities. Several of the leaks, the report warns, could have exposed private models, organizational structures, and even training data, potentially compromising competitive advantage and intellectual property.

The stakes are high: affected companies collectively have a market valuation of over $400 billion.

Real-World Examples
The study enumerates several examples of exposed secrets:
• LangChain was leaking various LangSmith API keys, including those with permissions to manage organizational members.

• An enterprise-tier ElevenLabs API key was found inside a plaintext file.

• One company from the Forbes AI 50 had an exposed Hugging Face token in a deleted fork, which allowed access to about 1,000 private models. That same company also leaked Weights & Biases keys, exposing data linked to model training.

Hidden Dangers Below the Surface

Traditional code scanning is missing such exposures, according to Wiz, because it is focused narrowly on public repositories. To find deeper vulnerabilities, its researchers adopted a three-dimensional approach they call Depth, Perimeter, and Coverage.

Depth: full commit histories, deleted forks, workflow logs, and gists are reviewed places standard scanners normally don’t look.

• Perimeter expanded the search beyond company repositories to include employees and contributors, who may unwittingly commit secrets to personal projects.

• Coverage sought AI-specific secret types like Weights & Biases, Groq, and Perplexity keys, which conventional tools usually tend to miss.

It appears from the results that the development pace of the AI sector has outpaced its security maturity. Nearly half of Wiz’s attempts at responsible disclosure either received no response or failed to reach the correct contacts, pointing to significant gaps in the vulnerability reporting and response procedures.
What Firms Should Do Now

Wiz enumerates three urgent steps for security leaders:

1. Consider all developers and contributors part of the attack surface. Implement the most stringent policies and procedures when onboarding them, including multi-factor authentication and explicit separation of personal versus professional use of GitHub.

2. Modernize internal secret-scanning practices. Go beyond simple repository checks and adopt comprehensive scans that mirror the Depth-Perimeter-Coverage approach.

3. Extend due diligence to third-party vendors. CISOs should review how AI partners manage credentials and disclosures before integrating their tools. Speed versus Security The report concludes that the very speed driving AI breakthroughs now poses one of the industry’s greatest security threats. As Wiz cautions, “For AI innovators, the message is clear: speed cannot come at the expense of security” a warning extending equally to the enterprises depending on them.

Congress Ends Shutdown but Federal Funding Standoff Deepens
How Amul AI Is Transforming Dairy Farming in India
Bitcoin Tax Panic Is Rising: What Crypto Investors Need to Know Before Filing
Yellow L3 clears and unifies fragmented blockchains now
Supreme Court Rulings Clarify Who Can Sue Over Election Rules

Sign up to FOMO Daily

Get the latest breaking news & weekly roundup, delivered straight to your inbox.

By signing up, you acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Reddit Telegram Threads Bluesky Email Copy Link Print
ByMiles Rowan
Follow:
A political and culture reporter covering the stories shaping today’s national conversation. With a focus on government policy, elections, and social movements, delivers in-depth analysis and reporting that helps readers understand how power and people intersect. Known for thoughtful journalism and a clear, engaging writing style, provides accurate, trustworthy news that informs and inspires.
Previous Article White House Signals Trump Will Sign Bill to End Government Shutdown
Next Article A Self-Inflicted Crisis at No. 10

Latest News

The Stablecoin Deadline Slips as the US Crypto Rulebook Debate Intensifies
Economy Finance Opinion Politics
Uniswap Wins Again in Court as Judge Draws a New Line on DeFi Liability
Business Cryptocurrency Finance International Crypto News Opinion
Agentic AI Adoption in 2026: Why the Era of Simple Chatbots Is Ending
News
US Supreme Court Leaves AI Copyright Ruling in Lower Courts’ Hands
ai News Opinion Politics
X, War, and the Flood of Disinformation in the Digital Battlefield
News Opinion Political News UK News
How Europe Can Prepare for the Autonomous AI Agent Economy
ai Europe Finance News Opinion
How SK Telecom Is Rebuilding Itself Around AI at MWC 2026
War News
Dubai and the UAE on the Frontlines: How the Iran Israel Conflict Has Reverberated Across a Global Hub
Opinion Politics War News
Revolut’s Pound Stablecoin Trial and the Future of Digital Money in the UK
Finance News Opinion
Europe Buys the Dip as U.S. Funds Keep Bleeding Who Is Buying Bitcoin Right Now?
Finance News Opinion Politics
US and Israel Military Strikes on Iran and the Escalation of Conflict in the Middle East
Money Opinion USA News War News
Has BRICS Lost Its Momentum in Challenging Western Economic Dominance?
Finance News Opinion Political News
Bitcoin Breaking Below 63K Signals Crypto Winter Lingers
Finance Opinion Politics
Australia’s New Hate Speech Laws and the Battle Over Free Expression
Free Speech News Opinion Politics

You Might Also Like

Bitcoin’s Coal Mine Canaries Are Chirping

January 29, 2026

Stock linked tokens regulation risks

October 8, 2025

El Salvador’s $100M Bitcoin Dip Buy Defies the IMF

November 20, 2025

Shibarium Reboots After $4M Exploit, Promises User Refund

October 3, 2025

FOMO Daily — delivering the stories, trends, and insights you can’t afford to miss.

We cut through the noise to bring you what’s shaping conversations, driving culture, and defining today — all in one quick, daily read.

  • Privacy Policy
  • Contact
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency

Subscribe to our newsletter to get the latest articles delivered to your inbox.

FOMO DailyFOMO Daily
Follow US
Copyright © 2026 FOMO Daily. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?