FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures
Related: No easy fixes for AI risk
That is the shape of the modern enterprise breach, says Dwayne McDaniel, senior developer advocate at non-human identity security firm GitGuardian, whom I interviewed at RSAC 2026. Each leaked credential, he explained, is a key to a door behind which sit more keys.
Leaks spiking
GitGuardian scans every public GitHub commit — every new batch of developer code published to a shared repository — for hard-coded secrets: credentials typed directly into source code. Its latest report documented 28.6 million such exposures in 2025 alone — a 34 percent year-over-year jump, the largest in five years. Private repositories ran six times worse.
And 64 percent of the credentials leaked in 2022 remain active today. GitGuardian emails developers the moment an exposed credential hits GitHub. The alerts go out. The credentials are rarely revoked. This is not a detection problem. It is a remediation problem.
What’s a developer?
Developers are no longer alone in producing that code. GitGuardian found that commits where Claude Code served as co-signer — meaning a developer let AI complete the cycle without review — contained secrets at 33 percent. The baseline for all commits: 1.5 percent.
The fix isn’t purely technical. Gartner’s 2026 IAM Summit flagged machine identity as among the least mature areas in enterprise security. Workload identity frameworks like SPIFFE, in production at Uber and State Farm, are replacing API keys one system at a time. The tools exist.
Governance needed
What has to come first is the governance conversation. Some forty regulatory standards already name the requirement plainly, McDaniel notes: unauthorized access. Who can reach what, can you prove it, and what did you do about it. That framing doesn’t require new vocabulary. It requires the conversation to happen.
Organizations that treat AI-assisted code as finished work will ship faster this quarter. They will also ship the next class of exposures buried inside it.
Yet McDaniel is hopeful. Standards bodies have stopped treating credential abuse as tomorrow’s problem. The IETF, the CNCF, and the OpenID Foundation have active work on machine identity, workload authentication, and agentic AI governance. The tools are arriving. Whether governance arrives in time is the open question.
For a full drill down, please give a listen to the accompanying Fireside Chat podcast.
I’ll keep watch and keep reporting.
Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.
(Editor’s note: I used Claude and ChatGPT to assist with research compilation, source discovery, and early draft structuring. All interviews, analysis, fact-checking, and final writing are my own. I remain responsible for every claim and conclusion.)
The post FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures first appeared on The Last Watchdog.
Lisa Kudrow has talked about “mean stuff going on behind the scenes” inside the Friends…
Playground Games design director Torben Ellert has answered an assortment of questions about next month’s…
Lost actor Harold Perrineau has revealed the stunning circumstances behind his character Michael's most controversial…
Gollum actor Andy Serkis has suggested that Avengers: Doomsday will include the long-awaited return of…
Now that Peter Berg is confirmed as the director of the upcoming Call of Duty…
This essay appears in our Spring 2026 issue. Subscribe to get a copy. On Saturday…
This website uses cookies.