DeepSeek has been the name on everyone's lips this week, as the release of its R1 AI model spooked the tech market and caused significant financial losses for several major players. Concerns have been raised regarding the security of the Chinese AI startup and its models—and if reports regarding an open database are to be believed, those claims may have some merit.
New York-based cloud security provider Wiz has issued an advisory claiming its research wing identified a publicly accessible ClickHouse database, belonging to DeepSeek, left «completely open and unauthenticated» (via The Register).
The database was said to have been discovered within minutes of the Wiz research team's investigation into DeepSeek's cybersecurity resilience and it contained «a significant volume of chat history, backend data, and sensitive information.»
Worse still, the database was so completely unprotected that it was possible to gain full database control and privilege escalation from inside the environment, with no authentication or defence mechanism present.
A potential attacker could have easily obtained plaintext passwords, local files, and proprietary data with a simple SQL command. Wiz duly informed DeepSeek of the open database, which it says was promptly secured.
As word of DeepSeek's efforts has spread throughout the tech industry, so have potential data security concerns from multiple sources. Data regulators from the UK, Italy, Ireland and Australia have all begun enquiries into the practices of the company, while OpenAI has complained that DeepSeek has been copying its models.
The US Navy has issued a warning to its members to avoid using DeepSeek «in any capacity», while the US National Security Council says it's looking into the security implications of the DeepSeek app.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
AI security provider HiddenLayer claims that DeepSeek-R1 is «vulnerable to jailbreak techniques, prompt
Read more on pcgamer.com