Exposed by Default: The Authentication Gap
A large scale security analysis of over one million self-hosted AI services has uncovered a troubling pattern of basic security omissions. Researchers examined certificate transparency logs to map publicly accessible AI infrastructure, finding that many systems were deployed with no authentication enabled. This means that sensitive company data, proprietary tooling, and user conversations were left open to anyone with an internet connection. The source code of several popular AI projects reveals that authentication is not configured as a default setting, leaving it to individual users to secure their deployments, a step many fail to take.
Real World Risks from Open Chatbots
The scan identified numerous specific examples of these exposures. Freely accessible chatbots based on platforms like OpenUI were found hosting complete user conversation histories. In an enterprise context, such chat logs can contain confidential business strategies, internal communications, or proprietary code. More alarmingly, several instances allowed any visitor to interact with powerful multimodal large language models without any restrictions. This creates a significant liability, as malicious actors could exploit these services to bypass safety guardrails. Potential abuses include generating illegal content or soliciting harmful advice, with the legal and reputational consequences falling on the organization that hosts the exposed service.
Source: The Hacker News

