×
Cybersecurity professionals sound the alarm about DeepSeek’s vulnerabilities
Written by
Published on
Join our daily newsletter for breaking news, product launches and deals, research breakdowns, and other industry-leading AI coverage
Join Now

DeepSeek, the Chinese AI model taking the tech world by storm, has been facing persistent jailbreaking vulnerabilities, with multiple security firms discovering significant safety risks in the company’s V3 and R1 models.

Key findings from security research: Multiple cybersecurity teams have successfully bypassed DeepSeek’s AI model safety restrictions, revealing concerning vulnerabilities in the system.

  • Unit 42’s research team demonstrated three different jailbreaking methods requiring minimal technical expertise
  • The compromised models provided instructions for creating malware, conducting social engineering attacks, and developing harmful devices
  • Cisco’s testing showed DeepSeek R1 failed to block any harmful prompts from a set of 50 HarmBench tests, resulting in a 100% attack success rate

Technical vulnerabilities: Security researchers uncovered deeper structural weaknesses in DeepSeek’s AI models that extend beyond typical safety bypass concerns.

  • Wallarm’s investigation exposed the model’s system prompt and core limitations
  • Researchers successfully extracted information about DeepSeek’s training methods and data sources
  • The security firm discovered potential evidence linking DeepSeek’s training to OpenAI’s proprietary models

Training data controversy: The security breaches have reignited discussions about AI model training practices and data ownership.

  • OpenAI has accused DeepSeek of violating its terms of service by using proprietary models for training
  • Wallarm’s testing revealed references to OpenAI in DeepSeek’s “training lineage,” though this doesn’t conclusively prove improper use
  • The situation highlights the irony of OpenAI’s accusations given its own controversial history with public data usage

Response and remediation: DeepSeek has taken steps to address the identified security issues, though questions remain about the company’s initial safety testing.

  • Wallarm reported the vulnerability to DeepSeek, which promptly implemented patches
  • A separate incident involving an exposed DeepSeek database was quickly resolved after discovery
  • These security issues emerged despite DeepSeek’s pre-release testing procedures

Looking beyond the immediate concerns: The recurring ability to jailbreak AI models, including those from established companies like OpenAI, suggests a broader industry challenge that extends beyond any single provider’s security measures. This pattern raises important questions about the inherent tensions between AI model capability and safety controls, as well as the industry’s approach to pre-release security testing.

Deepseek's AI model proves easy to jailbreak

Recent News

“Learn to AI”: California propels workforce training with tech giants across public education system

The partnerships target California's massive public education infrastructure to address growing AI workforce demand.

Qualcomm plans AI server chips for 2028 amid competitive challenges

A four-year wait for data center revenue while rivals cement their positions.

LangChain launches Open SWE, an AI agent for autonomous coding tasks

Works like an additional team member, handling complex projects autonomously while juggling multiple tasks.