GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读这篇文章,理解其主要内容和重点。 文章主要讲的是GitGuardian发布的第五版“Secrets Sprawl”报告,时间是2026年3月17日。报告指出2025年AI在软件开发中的广泛应用导致了密钥泄露率的上升。特别是Claude Code的泄露率是基线的两倍,达到了3.2%。同时,内部仓库成为最大的风险源,密钥泄露不仅限于代码,还扩展到了协作工具和开发者机器。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖AI的影响、泄露率的具体数据、内部仓库的风险以及密钥泄露的范围扩展。 可能会遇到的问题是如何在有限的字数内准确传达所有重要信息而不遗漏关键点。因此,我需要选择最核心的内容:AI导致泄露增加、Claude Code的数据、内部仓库风险和密钥泄露范围。 最后,组织语言,确保句子简洁明了,直接描述文章内容。 </think> GitGuardian报告指出,2025年人工智能在软件开发中的广泛应用导致密钥泄露率上升至基线的两倍(3.2%),内部仓库成为最大风险源。 2026-3-17 12:0:46 Author: securityboulevard.com(查看原文) 阅读量:10 收藏

New York, NY, March 17th, 2026, CyberNewswire

In 2025, Developer Commits Using Claude Code Show 3.2% Secret Leak Rate vs. 1.5% Baseline. The Human Factor Remains Critical

GitGuardian, the security leader behind GitHub’s most installed application, today released the 5th edition of its “State of Secrets Sprawl” report, documenting how mainstream AI adoption in 2025 reshaped software delivery and accelerated the exposure of non-human identities (NHIs) and their secrets across public and internal systems.

While the software ecosystem is growing quickly, leaked secrets are growing faster, and remediation is not keeping up.

The year software changed forever

In 2025, AI adoption permanently changed software engineering:

  • +43% YoY increase in public commits, growing at least 2× faster than before
  • Since 2021, secrets have been growing roughly 1.6× faster than the active developer population
  • Secret leak rates in AI-assisted code were, on average across the year, roughly double the GitHub-wide baseline. 

 Together, these forces drove a +34% YoY increase in newly leaked secrets on GitHub, reaching ~29 million secrets detected overall, marking the largest single-year jump ever recorded.

Nine takeaways for CISOs securing Non‑Human Identities (NHI)

Exposed credentials remain a major, repeatable path to compromise. In 2025, AI assistance increased the speed of software creation and multiplied the number of tokens, keys, and service identities embedded across modern stacks, without equivalent improvements in governance.

AI assistants are amplifying risk in new categories of credentials

1. Claude Code-assisted commits leaked secrets at ~3.2%, 2× the baseline. AI-assisted coding has democratized software development, enabling developers without formal training to build applications quickly. However, this accessibility comes with a security gap: less experienced developers may lack security awareness and can ignore AI warnings or explicitly prompt tools to include sensitive information. These leaked secrets may ultimately reflect human mistakes, not just AI failures.

2. AI service credentials leaks are accelerating fastest: leaks tied to AI services increased +81% YoY (to 1,275,105), and are more likely to slip through protections built primarily for conventional developer workflows.

3. MCP configuration risk is emerging: MCP server documentation often recommends placing credentials directly in configuration files rather than using safer client authentication patterns. This contributed to 24,008 unique secrets exposed in the studied MCP configuration files.

AI expands the attack surface overnight

4. Internal repositories remain the biggest exposure reservoir. They are ~6× more likely than public ones to contain hardcoded secrets.

5. Secrets sprawl extends beyond code: ~28% of incidents originate from leaks in collaboration and productivity tools (not just repositories), where credentials can be exposed to broader audiences, automations, and AI agents.

6. Developer machines are becoming part of the credential perimeter. As AI agents gain deeper local access (editors, terminals, files, credentials stores), prompt injection and supply-chain style attacks (Shai-Hulud, for example) can turn local secrets into organizational risk.

“AI agents need local credentials to connect across systems, turning developer laptops into a massive attack surface. We built our local scanning and identities inventory tool to protect them. Security teams need to map out exactly which machines hold which secrets, surfacing critical weaknesses like overprivileged access and exposed production keys.” says Eric Fourrier, GitGuardian’s CEO

The industry is facing a growing debt, and needs NHI governance, not just detection

7. Long-lived secrets still dominate: ~60% of policy violations are credentials that persist over time, highlighting the slow transition toward ephemeral, least-privilege access.

8. Prioritization is harder than it looks: ~46% of critical secrets have no vendor-provided validation mechanism, requiring contextual signals (location, usage, downstream consumers, and secrets managers) to assess real-world exploitability.

9. Remediation is failing at scale: 64% of valid secrets from 2022 are still not revoked in 2026, most often because security teams lack the governance needed to achieve a viable, repeatable remediation path for any leaked secret.

GitGuardian believes the next phase of security programs must treat non-human identities as first-class assets: with dedicated governance, context, and remediation automation across code and non-code surfaces.

The full report is available here

About GitGuardian

GitGuardian is an end-to-end NHI Security platform that empowers software-driven organizations to secure their Non-Human Identities (NHIs) and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non-human identities and their secrets’ lifecycles. The platform is the world’s most installed GitHub application and supports over 550+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF, and Bouygues Telecom for robust secrets protection.

For more information, users can visit www.gitguardian.com

Contact

PR Partner
Holly Hagerman
Connect Marketing
[email protected]


文章来源: https://securityboulevard.com/2026/03/gitguardian-reports-an-81-surge-of-ai-service-leaks-as-29m-secrets-hit-public-github/
如有侵权请联系:admin#unsafe.sh