Security

AI Code Is Leaking 29M Secrets: What Developers Must Know Now | Dwayne McDaniel, GitGuardian | TFiR

0

AI coding assistants promise speed and productivity, but they’re also leaking credentials at alarming rates. GitGuardian’s 2026 State of Secret Sprawl Report reveals 29 million hard-coded secrets hit public GitHub in 2025 alone—a 34% year-over-year increase. Claude Code-assisted commits showed a 3.2% leak rate versus 1.5% for human-only commits. Meanwhile, supply chain attacks are stealing secrets directly from developer laptops, and over 24,000 secrets have already leaked from MCP config files.

The shift from perimeter-based security to assume-breach strategies has never been more urgent. Attackers are no longer breaking in—they’re logging in with stolen credentials.

The Guest: Dwayne McDaniel, Senior Developer Advocate at GitGuardian

Key Takeaways

  • AI coding tools are leaking secrets at 2x the baseline rate, with Claude Code-assisted commits showing a 3.2% leak rate in 2025
  • Supply chain attacks like Shai-Hulud targeted developer laptops—44% of compromised machines contained 10+ secrets, including GitHub and GitLab tokens
  • Over 24,000 secrets leaked from MCP config files in the first year, including Postgres credentials and AI platform API keys
  • Internal repos are 6x more likely to leak secrets than public ones due to a false sense of security
  • Non-human identity (NHI) governance is the next evolution beyond detection: inventory, lifecycle management, and workload-based authentication

***

Read Full Transcript & Technical Deep Dive

Watch the Full Interview

Watch the complete conversation with Dwayne McDaniel on TFiR’s YouTube channel

AI Token Costs Are Spiraling — Rob Hirschfeld of RackN on Hybrid Infrastructure | TFiR

Previous article