A new cybersecurity study published by Wiz has found that the majority of the world’s top artificial intelligence companies are inadvertently exposing confidential information online, underscoring a growing disconnect between rapid innovation and basic security discipline.
According to the report, 65% of the 50 leading AI companies analyzed had leaked verified secrets on GitHub, including API keys, authentication tokens, and other sensitive credentials. Many of these exposures were buried deep within repositories or deleted forks areas rarely examined by standard scanning tools.
A Preventable Error
According to Glyn Morgan, the Country Manager for the UK & Ireland at Salt Security, the trend is both “glaring and avoidable.”
“When AI companies inadvertently leak their API keys, it points to a fundamental failure in governance and configuration,” he said. “It hands attackers a direct route into systems, models, and data while bypassing the usual defensive layers.”
The Wiz research underlines that these security oversights are far from isolated developer mistakes. As enterprises increasingly partner with AI startups, they become quite exposed to the same kinds of vulnerabilities. Several of the leaks, the report warns, could have exposed private models, organizational structures, and even training data, potentially compromising competitive advantage and intellectual property.
The stakes are high: affected companies collectively have a market valuation of over $400 billion.
Real-World Examples The study enumerates several examples of exposed secrets: • LangChain was leaking various LangSmith API keys, including those with permissions to manage organizational members.
• An enterprise-tier ElevenLabs API key was found inside a plaintext file.
• One company from the Forbes AI 50 had an exposed Hugging Face token in a deleted fork, which allowed access to about 1,000 private models. That same company also leaked Weights & Biases keys, exposing data linked to model training.
Hidden Dangers Below the Surface
Traditional code scanning is missing such exposures, according to Wiz, because it is focused narrowly on public repositories. To find deeper vulnerabilities, its researchers adopted a three-dimensional approach they call Depth, Perimeter, and Coverage.
Depth: full commit histories, deleted forks, workflow logs, and gists are reviewed places standard scanners normally don’t look.