Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

The hidden security risks of open source AI | Computer Weekly

By Computer Weekly by By Computer Weekly
June 2, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Open source AI is gaining momentum across major players. DeepSeek recently announced plans to share parts of its model architecture and code with the community. Alibaba followed suit with the release of a new open source multimodal model aimed at enabling cost-effective AI agents. Meta’s Llama 4 models, described as “semi-open,” are among the most powerful publicly available AI systems.

The growing openness of AI models fosters transparency, collaboration, and faster iteration across the AI community. But those benefits come with familiar risks. AI models are still software – often bundled with extensive codebases, dependencies, and data pipelines. Like any open source project, they can harbour vulnerabilities, outdated components, or even hidden backdoors that scale with adoption.

AI models are, at their core, still code – just with additional layers of complexity. Validating traditional components is like reviewing a blueprint: intricate, but knowable. AI models are black boxes built from massive, opaque datasets and hard-to-trace training processes. Even when datasets or tuning parameters are available, they’re often too large to audit. Malicious behaviours can be trained in, intentionally or not, and the non-deterministic nature of AI makes exhaustive testing impossible. What makes AI powerful also makes it unpredictable, and risky.

Bias is one of the most subtle and dangerous risks. Skewed or incomplete training data bakes in systemic flaws. Opaque models make bias hard to detect – and nearly impossible to fix. If a biased model is used in hiring, lending, or healthcare, it can quietly reinforce harmful patterns under the guise of objectivity. This is where the black-box nature of AI becomes a liability. Enterprises are deploying powerful models without fully understanding how they work or how their outputs could impact real people.

These aren’t just theoretical risks. You can’t inspect every line of training data or test every possible output. Unlike traditional software, there’s no definitive way to prove that an AI model is safe, reliable, or free from unintended consequences.

Since you can’t fully test AI models or easily mitigate the downstream impacts of their behaviour, the only thing left is trust. But trust doesn’t come from hope; it comes from governance. Organisations implement clear oversight to ensure models are vetted, provenance tracked, and behaviour monitored over time. This isn’t just technical; it’s strategic. Until businesses treat open source AI with the same scrutiny and discipline as any other part of the software supply chain, they’ll be exposed to risks they can’t see with consequences they can’t control.

  1. Securing open source AI: A call to action

Businesses should treat open source AI with the same rigour as software supply chain security, and more. These models introduce new risks that can’t be fully tested or inspected, so proactive oversight is essential.

  1. Establish visibility into AI usage:

Many organisations don’t yet have the tools or processes to detect where AI models are being used in their software. Without visibility into model adoption, whether embedded in applications, pipelines, or APIs – governance is impossible. You can’t manage what you can’t see.

  1. Adopt software supply chain best practices:

Treat AI models like any other critical software component. That means scanning for known vulnerabilities, validating training data sources, and carefully managing updates to prevent regressions or new risks.

  1. Implement governance and oversight:

Many organisations have mature policies for traditional open source use, and AI models deserve the same scrutiny. Establish governance frameworks that include model approval processes, dependency tracking, and internal standards for safe and compliant AI usage.

  1. Push for transparency:

AI doesn’t have to be a black box. Businesses should demand transparency around model lineage: who built it, what data it was trained on, how it’s been modified, and where it came from. Documentation should be the norm, not the exception.

  1. Invest in continuous monitoring:

AI risk doesn’t end at deployment. Threat actors are already experimenting with prompt injection, model manipulation, and adversarial exploits. Real-time monitoring and anomaly detection can help surface issues before they cascade into broader failures.

DeepSeek’s decision to share elements of its model code reflects a broader trend: major players are starting to engage more with the open source AI community, even if full transparency remains elusive. For enterprises consuming these models, this growing accessibility is an opportunity and a responsibility. The fact that a model is available doesn’t mean it’s trustworthy by default. Security, oversight, and governance must be applied downstream to ensure these tools are safe, compliant, and aligned with business objectives.

In the race to deploy AI, trust is the foundation. And trust requires visibility, accountability, and governance every step of the way.

Brian Fox is co-founder and chief technology officer at Sonatype, a software supply chain security company.



Source link

By Computer Weekly

By Computer Weekly

Next Post
HP Bets On Chip Startup Hailo For Edge AI Accelerator M.2 Card

HP Bets On Chip Startup Hailo For Edge AI Accelerator M.2 Card

Recommended.

Northstar Enterprise + Defense and Bridgepointe Technologies Announce Strategic Partnership to Accelerate Deployment of Modular Data Centers and In-Line Amplifier (ILA) Solutions

Northstar Enterprise + Defense and Bridgepointe Technologies Announce Strategic Partnership to Accelerate Deployment of Modular Data Centers and In-Line Amplifier (ILA) Solutions

February 20, 2026
Consumer Financial Protection Bureau staff told to work remotely as headquarters is shuttered

Consumer Financial Protection Bureau staff told to work remotely as headquarters is shuttered

February 9, 2025

Trending.

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

April 10, 2025
Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

April 29, 2026
Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio