{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifu3knxek3yi277qmhgsazfcbf3cc6ey52q7u7b6fc2ka47jsmy7i",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mf7mp5egi222"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreicghrravnpdmpeuoklvi3c2zi5jgbn46vy2ogtdoh2pktds5tlxbe"
},
"mimeType": "image/jpeg",
"size": 100450
},
"path": "/2026/02/from-exposure-to-exploitation-how-ai.html",
"publishedAt": "2026-02-19T11:55:00.000Z",
"site": "https://thehackernews.com",
"textContent": "We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a \"temporary\" API key for testing and forgets to revoke it. In the past, these were minor operational risks, debts you’d eventually pay down during a slower cycle.\nIn 2026, “Eventually” is Now\nBut today, within minutes, AI-powered",
"title": "From Exposure to Exploitation: How AI Collapses Your Response Window"
}