{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifu3knxek3yi277qmhgsazfcbf3cc6ey52q7u7b6fc2ka47jsmy7i",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mf7mp5egi222"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreicghrravnpdmpeuoklvi3c2zi5jgbn46vy2ogtdoh2pktds5tlxbe"
    },
    "mimeType": "image/jpeg",
    "size": 100450
  },
  "path": "/2026/02/from-exposure-to-exploitation-how-ai.html",
  "publishedAt": "2026-02-19T11:55:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a \"temporary\" API key for testing and forgets to revoke it. In the past, these were minor operational risks, debts you’d eventually pay down during a slower cycle.\nIn 2026, “Eventually” is Now\nBut today, within minutes, AI-powered",
  "title": "From Exposure to Exploitation: How AI Collapses Your Response Window"
}