News: 1762811056

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

AI companies keep publishing private API keys to GitHub

(2025/11/10)


Leading AI companies turn out to be no better at keeping secrets than anyone else writing code.

Cloud security firm Wiz has found that 65 percent of the [1]Forbes AI 50 "had leaked verified secrets on GitHub," minus a few with no presence on the code sharing site.

"Some of these leaks could have exposed organizational structures, training data, or even private models," said Wiz threat researchers Shay Berkovich and Rami McCarthy in a [2]blog post .

[3]

The secrets consist of API keys, tokens, and other digital credentials that are supposed to be kept out of code commits to git repos. But as the security biz noted last month, developers of VS Code extensions [4]keep making their secrets known , a problem that McCarthy has attributed in part to vibe coding.

[5]

[6]

Secret leakage is a longstanding problem. Back in 2017, security researcher Dylan Ayrey [7]published a tool called TruffleHog to find secrets inadvertently uploaded into code repos.

But awareness of the problem has failed to eliminate it. In 2020, as we noted, [8]AWS keys kept leaking due to configuration errors. In 2023, the Python Package Index (PyPI) was found to contain [9]many packages with AWS API keys . There are many other examples.

[10]

A recent source of API keys has been LLMs – they can capture exposed API keys in training data and can be convinced to disgorge those keys [11]with the right coaxing .

Wiz, which sells secret scanning as a service, claims that its approach covers more ground than traditional repo scanning tools. "Our deep scan includes full commit history, commit history on forks, deleted forks, workflow logs and gists (which can also have forks!)," explained Berkovich and McCarthy.

[12]Critical federal cybersecurity funding set to resume as government shutdown draws to a close - for now

[13]How to bluff your way to AI credibility with the right buzzwords

[14]Cisco creating new security model using 30 years of data describing cyber-dramas and saves

[15]ChatGPT, Claude, and Grok make very squishy jury members

Self-serving though that may be, Google has agreed to buy Wiz [16]for $32 billion in cash , so perhaps there's something there.

"Exposed secrets are usually a symptom of broader challenges, like limited visibility, fragmented ownership, or missing automated checks in the development pipeline," said Berkovich in an email to The Register . "In the cloud, everything moves fast and without strong guardrails, even mature teams can miss high-impact risks."

The most common sources for secret leakage when Wiz [17]initially looked at this issue came from Jupyter Notebook files (.ipynb), Python files (.py), and environment files (.env). These consisted mainly of keys and tokens from Hugging Face, AzureOpenAI, and WeightsAndBiases.

[18]

"Hugging Face tokens are notorious for allowing access to private AI models," said Berkovich. "The leaked Hugging Face token belonging to an AI 50 company could have exposed access to ~1,000 private models, allowing an attacker to download or inspect proprietary IP. "

Berkovich added that the WeightsAndBiases API keys belong to the same company and could have granted access to sensitive training data behind private models such as confidential business data.

Wiz has chosen not to name and shame the firms spilling their sensitive keys across GitHub, other than ElevenLabs and LangChain. The ElevenLabs API key was spotted in a plaintext mcp.json file, which Berkovich and McCarthy say "speaks to the relationship between vibe coding and secrets leakage" that they noted previously.

"Advances in AI development result in new use cases and possibilities of secret leaks (ipynb files, vibe coding, gaps in coverage of new AI-specific secret types)," said Berkovich. "That's why our working hypothesis was that any AI company with a big enough GitHub footprint has exposed secrets. This was confirmed by the high proportion (65 percent) of AI innovators with exposed secrets."

According to Wiz, ElevenLabs and LangChain responded promptly when alerted to the exposed secrets. But almost half of the security disclosures either couldn't be delivered or received no response.

The first step toward solving your secret exposure problem is admitting that you have a problem. ®

Get our [19]Tech Resources



[1] https://www.forbes.com/lists/ai50/

[2] https://www.wiz.io/blog/forbes-ai-50-leaking-secrets#overview-0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/aiml&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aRJuhlMPZ8BoBRDdM-uL5wAAAQw&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[4] https://www.theregister.com/2025/10/15/vc_code_extension_leaks/

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/aiml&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aRJuhlMPZ8BoBRDdM-uL5wAAAQw&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/aiml&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aRJuhlMPZ8BoBRDdM-uL5wAAAQw&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2017/01/09/hacker_publishes_github_secret_key_hunter/

[8] https://www.theregister.com/2020/08/03/leaky_s3_buckets/

[9] https://www.theregister.com/2023/01/09/pypi_aws_malware_key/

[10] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/aiml&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aRJuhlMPZ8BoBRDdM-uL5wAAAQw&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[11] https://www.theregister.com/2023/09/19/github_copilot_amazon_api/

[12] https://www.theregister.com/2025/11/10/federal_cybersecurity_funding_set_to_resume/

[13] https://www.theregister.com/2025/11/10/ai_credibility_buzzwords/

[14] https://www.theregister.com/2025/11/10/cisco_new_17bn_parameter_model/

[15] https://www.theregister.com/2025/11/08/chatgpt_claude_and_grok_vote/

[16] https://www.theregister.com/2025/11/05/googles_32b_wiz_acquisition_its/

[17] https://www.wiz.io/blog/leaking-ai-secrets-in-public-code

[18] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_software/aiml&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aRJuhlMPZ8BoBRDdM-uL5wAAAQw&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[19] https://whitepapers.theregister.com/



Michael Hoffmann

El Reg, we *really* need a facetious "this is my surprised face"icon!

move fast and break often

Nate Amsden

Clearly breaking so often nobody has time to care about security. Someone nabs their cloud keys and starts stealing resources they probably will think it's normal activity (bill so high already what's another million between enemies)

I've run DOOM more in the last few days than I have the last few
months. I just love debugging ;-)
(Linus Torvalds)