×
Cybersecurity professionals sound the alarm about DeepSeek’s vulnerabilities
Written by
Published on
Join our daily newsletter for breaking news, product launches and deals, research breakdowns, and other industry-leading AI coverage
Join Now

DeepSeek, the Chinese AI model taking the tech world by storm, has been facing persistent jailbreaking vulnerabilities, with multiple security firms discovering significant safety risks in the company’s V3 and R1 models.

Key findings from security research: Multiple cybersecurity teams have successfully bypassed DeepSeek’s AI model safety restrictions, revealing concerning vulnerabilities in the system.

  • Unit 42’s research team demonstrated three different jailbreaking methods requiring minimal technical expertise
  • The compromised models provided instructions for creating malware, conducting social engineering attacks, and developing harmful devices
  • Cisco’s testing showed DeepSeek R1 failed to block any harmful prompts from a set of 50 HarmBench tests, resulting in a 100% attack success rate

Technical vulnerabilities: Security researchers uncovered deeper structural weaknesses in DeepSeek’s AI models that extend beyond typical safety bypass concerns.

  • Wallarm’s investigation exposed the model’s system prompt and core limitations
  • Researchers successfully extracted information about DeepSeek’s training methods and data sources
  • The security firm discovered potential evidence linking DeepSeek’s training to OpenAI’s proprietary models

Training data controversy: The security breaches have reignited discussions about AI model training practices and data ownership.

  • OpenAI has accused DeepSeek of violating its terms of service by using proprietary models for training
  • Wallarm’s testing revealed references to OpenAI in DeepSeek’s “training lineage,” though this doesn’t conclusively prove improper use
  • The situation highlights the irony of OpenAI’s accusations given its own controversial history with public data usage

Response and remediation: DeepSeek has taken steps to address the identified security issues, though questions remain about the company’s initial safety testing.

  • Wallarm reported the vulnerability to DeepSeek, which promptly implemented patches
  • A separate incident involving an exposed DeepSeek database was quickly resolved after discovery
  • These security issues emerged despite DeepSeek’s pre-release testing procedures

Looking beyond the immediate concerns: The recurring ability to jailbreak AI models, including those from established companies like OpenAI, suggests a broader industry challenge that extends beyond any single provider’s security measures. This pattern raises important questions about the inherent tensions between AI model capability and safety controls, as well as the industry’s approach to pre-release security testing.

Deepseek's AI model proves easy to jailbreak

Recent News

Ex-Google DeepMind researchers launch $130M AI startup to build autonomous coding tools

Former DeepMind researchers secure major funding to build AI tools that can independently write and test software code.

One Training to Rule Them All: AI’s replicative properties could fundamentally reshape economic growth

Once trained, AI models can be duplicated endlessly at minimal cost, giving them a powerful economic advantage over human workers which are inherently limited in scale.

Finnish church hosts country’s first AI-generated worship service, though reception iffy

Finnish church draws 120 attendees to watch AI deliver sermons, generate biblical imagery, and compose hymns while maintaining limits on sacramental duties.