{"id":2162,"date":"2025-03-03T14:01:35","date_gmt":"2025-03-03T14:01:35","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2162"},"modified":"2025-03-03T14:01:35","modified_gmt":"2025-03-03T14:01:35","slug":"forscher-entdecken-llm-sicherheitsrisiko","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2162","title":{"rendered":"Forscher entdecken LLM-Sicherheitsrisiko"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\"> srcset=&#8221;https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?quality=50&amp;strip=all 6000w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=1024%2C576&amp;quality=50&amp;strip=all 1024w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=2048%2C1152&amp;quality=50&amp;strip=all 2048w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=854%2C480&amp;quality=50&amp;strip=all 854w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=640%2C360&amp;quality=50&amp;strip=all 640w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=444%2C250&amp;quality=50&amp;strip=all 444w&#8221; width=&#8221;1024&#8243; height=&#8221;576&#8243; sizes=&#8221;(max-width: 1024px) 100vw, 1024px&#8221;&gt;Forscher haben Anmeldeinformationen in den Trainingsdaten von Large Language Models entdeckt.\n<p class=\"imageCredit\">BOY ANTHONY \u2013 Shutterstock.com<\/p>\n<\/div>\n<p>Beliebte LLMs wie <a href=\"https:\/\/www.csoonline.com\/article\/3822883\/deepseek-erfasst-tastatureingabemuster-2.html\">DeepSeek<\/a> werden mit<a href=\"https:\/\/www.technologyreview.com\/2025\/01\/31\/1110740\/how-deepseek-ripped-up-the-ai-playbook-and-why-everyones-going-to-follow-it\/#:~:text=To%20train%20last%20year's%20model,of%20math%20problems%20by%20hand.\"> <\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Common_Crawl\">Common Crawl<\/a> trainiert, einem riesigen Datensatz mit Website-Informationen. Forscher von <a href=\"https:\/\/trufflesecurity.com\/blog\/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data\">Truffle Security<\/a> haben k\u00fcrzlich einen Datensatz des Webarchives analysiert, der \u00fcber 250 Milliarden Seiten umfasst und Daten von 47,5 Millionen Hosts enth\u00e4lt. Dabei stellten sie fest, dass rund 12.000 hartcodierte Live-API-Schl\u00fcssel und Passw\u00f6rter dazu z\u00e4hlen.<\/p>\n<p>Der Analyse zufolge enth\u00e4lt das Datenpaket von Common Crawl insgesamt 219 verschiedene Geheimnistypen. Darunter Amazon Web Services (AWS) Root-Schl\u00fcssel, Slack-Webhooks und Mailchimp-API-Schl\u00fcssel. Da man sich mit diesen Anmeldedaten erfolgreich authentifizieren kann, stellen sie sowohl f\u00fcr Benutzer als auch f\u00fcr Organisationen ein erhebliches Sicherheitsrisiko dar.<\/p>\n<p>\u201eDies verdeutlicht ein wachsendes Problem: LLMs, die mit unsicherem Code trainiert wurden, k\u00f6nnen versehentlich unsichere Ausgaben generieren\u201c, warnen die Forscher. Demnach k\u00f6nnen LLMs w\u00e4hrend des Trainings nicht zwischen g\u00fcltigen und ung\u00fcltigen Geheimnissen unterscheiden. \u201eDas bedeutet, dass beide gleicherma\u00dfen zur Bereitstellung unsicherer Codebeispiele beitragen\u201c, hei\u00dft es im Forschungsbericht.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>srcset=&#8221;https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?quality=50&amp;strip=all 6000w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=1024%2C576&amp;quality=50&amp;strip=all 1024w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=2048%2C1152&amp;quality=50&amp;strip=all 2048w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=854%2C480&amp;quality=50&amp;strip=all 854w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=640%2C360&amp;quality=50&amp;strip=all 640w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/03\/shutterstock_2450854311.jpg?resize=444%2C250&amp;quality=50&amp;strip=all 444w&#8221; width=&#8221;1024&#8243; height=&#8221;576&#8243; sizes=&#8221;(max-width: 1024px) 100vw, 1024px&#8221;&gt;Forscher haben Anmeldeinformationen in den Trainingsdaten von Large Language Models entdeckt. BOY ANTHONY \u2013 Shutterstock.com Beliebte LLMs wie DeepSeek werden mit Common Crawl trainiert, einem riesigen Datensatz mit [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2163,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2162"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2162"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2163"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}