{"id":4564,"date":"2023-11-23T14:50:21","date_gmt":"2023-11-23T14:50:21","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=4564"},"modified":"2024-03-06T08:40:28","modified_gmt":"2024-03-06T08:40:28","slug":"hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/","title":{"rendered":"Hacking AI vs. DevOps security &#8211; how attackers impose their will on AI and how to protect your DevOps data"},"content":{"rendered":"\n<p><strong>Let\u2019s plunge into the intricacies of AI vulnerabilities, the ways cybercriminals use AI, and the significance of DevOps security. Find out which practices can help you protect your data\u2026 small hint, backup is among them. Test a <a href=\"https:\/\/gitprotect.io\/azure-devops-backup.html\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps backup<\/a> solution for free during <\/strong><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>a 14-day trial period<\/strong><\/a><strong>.<\/strong>\u00a0<\/p>\n\n\n\n<p>DevOps teams rely a lot on AI.. and here we speak not only about AI coding assistance tools\u2026 It boosts their productivity, saves time, and the list goes on and on. However, what about the risks organizations can run into taking AI for granted? Can it lead to data breaches or numerous vulnerabilities? In its recent report, <a href=\"https:\/\/www.forrester.com\/blogs\/predictions-2024-security-and-risk\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2024, cybersecurity, risk, and privacy predictions<\/a>, Forrester warns that being so eager to improve its productivity using AI, DevOps can face challenges and data breaches: <em>\u201cAt least three data breaches will be publicly blamed on AI-generated code.\u201d<\/em><\/p>\n\n\n\n<!--more-->\n\n\n\n\n\n<h2 class=\"wp-block-heading\">AI in DevOps processes<\/h2>\n\n\n\n<p>AI development assistants are gaining more and more popularity among DevOps. According to the already-mentioned Forrester report, 49% of businesses and technology professionals have already been piloting and implementing AI-coding assistants. And, in its <a href=\"https:\/\/about.gitlab.com\/developer-survey\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2023 Global DevSecOps Report<\/a> GitLab states that 65% of <em>\u201cdevelopers said that they are using artificial intelligence and machine learning in testing efforts or will be in the next three years.\u201d <\/em>&nbsp;Moreover, the <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-07-05-gartner-survey-finds-79-percent-of-corporate-strategists-see-ai-and-analytics-as-critical-to-their-success-over-the-next-two-years\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Gartner survey<\/a> finds that no less than 79% of corporate strategists recognize AI as a critical aspect of their success over the next few years. So, what makes the integration of AI tools into the DevOps processes so attractive?&nbsp;<\/p>\n\n\n\n<p>Just in a few words: automation, improved efficiency, and reduced costs. AI is making its mark across the software lifecycle, enhancing everything from code creation to deployment, ensuring that speed does not compromise quality or security. Thus, the <a href=\"https:\/\/gitprotect.io\/blog\/harnessing-ai-and-chatgpt-for-devops-processes\/\" target=\"_blank\" rel=\"noreferrer noopener\">key benefits of integrating AI tools into the development process<\/a> can be:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Predictive analysis to forecast challenges<\/h3>\n\n\n\n<p>By sifting through vast amounts of logs, metrics, and other data, AI algorithms can identify patterns and anomalies faster. Thus, DevOps teams can foresee potential system failures or bottlenecks before they escalate into major issues. For instance, by analyzing past incidents and their triggers, AI can predict when a similar event might occur, enabling teams to take preemptive action.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Automation for productivity and efficiency<\/h3>\n\n\n\n<p>The essence of DevOps lies in automation, and AI elevates it to new heights. AI-driven automation tools can optimize the deployment pipeline, ensuring code is tested, integrated, and deployed with unprecedented speed.&nbsp;<\/p>\n\n\n\n<p>For example, GitLab has already implemented AI into its platform. Thus, dev teams can write and deliver code more efficiently by simply viewing code suggestions while typing. Moreover, the vendor has recently presented GitLab Duo which enhances the software development lifecycle, integrating AI-driven tools directly into the DevSecOps platform to streamline workflows and boost efficiency. GitHub also has its AI-powered coding assistant &#8211; <a href=\"https:\/\/gitprotect.io\/blog\/github-copilot-introduction-an-ai-assisted-coding\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Copilot<\/a>, which supports a wide range of frameworks and programming languages. Atlassian provides its AI-driven virtual teammate which is aimed at accelerating teamwork.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What\u2019s next &#8211; GenAI?<\/h3>\n\n\n\n<p>For sure, developers will continue implementing AI-assisted software into their DevOps lifecycles. In its <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-10-16-gartner-identifies-the-top-10-strategic-technology-trends-for-2024\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Top Strategic Technology Trends for 2024<\/a>, Gartner predicts that by 2026&nbsp; <em>\u201cover 80% of enterprises will have used GenAI APIs and models\/or deployed GenAI-enabled applications in production environments.\u201d<\/em> Thus, software engineers will be able to devote more time to strategic activities and less time they will spend on writing the code. However, what about the risks of implementing GenAI into the development process?&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><em>\u201cGenAI presents an opportunity to accomplish things never before possible in the scope of human existence,\u201d said Daryl Plummer, Distinguished VP Analyst at Gartner. \u201cCIOs and executive leaders will embrace the risks of using GenAI so they can reap the unprecedented benefits.\u201d<\/em><br><br>Source: <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-10-17-gartner-unveils-top-predictions-for-it-organizations-and-users-in-2024-and-byond\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Gartner\u2019s Press Release: Gartner Unveils Top Predictions for IT Organizations and Users in 2024 and Beyond<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI Vulnerabilities &amp; Offensive AI threaten your data<\/h2>\n\n\n\n<p>While DevOps use AI to boost productivity, efficiency, and speed, their source code still can have vulnerabilities. However, AI-driven tools are powerful, they are still innovative and need a lot of attentiveness from the DevOps side. Haven\u2019t you ever been typing any line and after re-reading your text noticed typoes or any other kinds of mistakes? Dare to say that it had a place to be\u2026 It can lead to vulnerabilities which, consequently, attackers may use against you. Moreover, due to its novelty, AI definitely has some vulns. So, now let\u2019s get down to the nitty-gritty aspect of how cyber criminals use AI and impose their will on it\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How cybercriminals attack AI<\/h3>\n\n\n\n<p>Some time ago Google created a \u2018red team\u2019 to explore how malicious actors could attack AI systems. In <a href=\"https:\/\/services.google.com\/fh\/files\/blogs\/google_ai_red_team_digital_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">their report<\/a>, they outlined the most common tactics, techniques, and procedures (TTPs) that attackers use against AI systems:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"651\" height=\"374\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-Google-results.jpg\" alt=\"How cybercriminals attack AI\" class=\"wp-image-4566\" style=\"width:500px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-Google-results.jpg 651w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-Google-results-300x172.jpg 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-Google-results-400x230.jpg 400w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\">Source: <a href=\"https:\/\/blog.google\/technology\/safety-security\/googles-ai-red-team-the-ethical-hackers-making-ai-safer\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Common types of red team attacks on AI systems<\/a><\/p>\n\n\n\n<p>Let\u2019s go through them one by one:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Data poisoning<\/h4>\n\n\n\n<p>Beyond real-time manipulations, AI systems face threats from data poisoning, where malicious data is introduced into the training sets, leading the AI to make incorrect or biased decisions. This covert risk can have extensive repercussions, often becoming apparent only after significant damage has occurred. Targeted data poisoning and clean-label attacks, where the poisoned data is subtly mislabeled, represent sophisticated strategies that attackers may employ to compromise AI systems.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Prompt attacks<\/h4>\n\n\n\n<p>Using their creative prompts, attackers can instruct large language models (LLMs) which power GenAI products and services to perform their instructions. For example, cybercriminals can include malicious instructions in a phishing email, that will trick AI mail tools into defining it as a legitimate one. <em>\u201cBy including instructions for the model in such untrusted input, an adversary may be able to influence the behavior of the model, and hence the output in ways that were not intended by the application.\u201d<\/em> &#8211; states <a href=\"https:\/\/services.google.com\/fh\/files\/blogs\/google_ai_red_team_digital_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google AI Red Team\u2019s report<\/a>.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Adversarial attacks<\/h4>\n\n\n\n<p>AI systems, even sophisticated ones like advanced image classifiers, are susceptible to adversarial attacks. A notable example is an image classifier that, with slight alterations to an image of a panda, can be misled into identifying it as a gibbon. These subtle manipulations, often imperceptible to the human eye, highlight the susceptibility of AI systems to deception.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Training data extraction and security<\/h4>\n\n\n\n<p>The security of training data is important, as attackers may target AI systems to extract or exfiltrate this data, posing additional threats to data privacy and security. Employing techniques such as differential privacy in training data and secure multi-party computation for training models on encrypted data can enhance the security of AI systems.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Backdoor attacks<\/h4>\n\n\n\n<p>In this case, an attacker tries to secretly change the behavior of the AI model to generate inaccurate outputs by using certain \u201ctrigger\u201d terms or characteristics. They can achieve it in different ways: by directly changing the weights of the model, or by changing the model\u2019s file representation.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Exfiltration<\/h4>\n\n\n\n<p>During a simple exfiltration attack, the attacker copies the model\u2019s file representation. Sometimes, if the cybercriminals have more resources, they could try to use more sophisticated techniques, including querying a particular model to find out its capabilities and then utilizing that data to create their own.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The other side of the coin &#8211; AI abuses &amp; misuses<\/h3>\n\n\n\n<p>Cybercriminals use AI to find vulnerabilities in organizations\u2019 security systems and create new malware. What\u2019s more, by using AI, bad actors can test their attack techniques and alter their attack strategies in real time, which gives them a significant advantage and introduces new threats.&nbsp;<\/p>\n\n\n\n<p>Moreover, it\u2019s bad actors\u2019 common strategy to attack vulnerabilities of AI and ML models designed to identify and baffle breach attempts. There are a few ways cybercriminals can use AI to launch their cyber attacks:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AI-supported password cracking<\/h4>\n\n\n\n<p>Bad actors do their best to employ AI and ML and improve their algorithms for guessing users\u2019 passwords. According to the <a href=\"https:\/\/www.homesecurityheroes.com\/ai-password-cracking\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Home Security Heroes report<\/a> AI can easily crack commonly used passwords. They used PassGAN, and AI cracker, and ran it through the list of more than 15M passwords. As a result, 51% of common passwords can be cracked in less than a minute, and only a month they need to guess 81% of commonly used passwords.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"943\" height=\"937\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1.jpg\" alt=\"How fast AI can crack passwords\" class=\"wp-image-4567\" style=\"width:499px;height:auto\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1.jpg 943w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1-300x298.jpg 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1-150x150.jpg 150w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1-768x763.jpg 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1-180x180.jpg 180w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI-1-400x397.jpg 400w\" sizes=\"(max-width: 943px) 100vw, 943px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\">Source: <a href=\"https:\/\/www.homesecurityheroes.com\/ai-password-cracking\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Home Security Heroes report<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AI impersonation&nbsp;<\/h4>\n\n\n\n<p>Cybercriminals can abuse AI to imitate human behavior successfully tricking bot detection systems on social media platforms and communities. Thus, by imitating human-like use patterns, threat actors can then profit from the infected system to create fraudulent streams for a particular artist through the mentioned AI-supported impersonation.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AI-generated phishing emails<\/h4>\n\n\n\n<p>We all read tens of emails every day. You can get email notifications from apps you\u2019re using, or colleagues. And what if one of those emails will be a phishing one? Yeap.. they usually contained mistakes and were easy to spot, but AI now helps malicious actors generate well-written and convincing content for phishing scams.<\/p>\n\n\n\n<p>Moreover, using AI cybercriminals can also personalize emails by imitating tone, language, and style. Thus, they can easily place ransomware and infect your data.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Deepfakes<\/h4>\n\n\n\n<p>Malicious actors can misuse AI to craft fake forms of media. This way,&nbsp; they can spread false information. For example, if you\u2019re using some templates created by the developer and influencer you trust, then you see that he or she makes a video about some improvements and updates, and shares a link with you, will you use it? More yes, than no! By following the link you can run into ransomware, that\u2019s it\u2026 the cybercriminal reached his goal.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AI-supported hacking<\/h4>\n\n\n\n<p>It\u2019s not a secret that since its appearance the Internet has had some vulnerabilities, thus there are always new patches, developments, and improvements in this niche. Cybercriminals like using those vulns to get their gains and with the development of AI it can be easier. Hence, threat actors weaponize AI frameworks to help them hack vulnerable hosts.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to mitigate the risks?&nbsp;<\/h2>\n\n\n\n<p>To navigate these turbulent waters, a comprehensive approach is required. This involves not just technical safeguards, but also establishing a framework that ensures accountability and transparency in AI systems. It&#8217;s about creating a culture where security is at the very first place, and every stakeholder understands their role in protecting the integrity of AI. This includes regular audits, ensuring data quality, and maintaining a vigilant stance against potential threats. By doing so, the company can fortify its defenses, making AI a reliable ally.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure coding and code reviews<\/h3>\n\n\n\n<p>Developers need to write code with security in mind from the outset, which includes validating inputs to prevent injection attacks, handling errors securely to avoid exposing sensitive information and ensuring secure communication between different parts of the application. Peer reviews and automated security scanning are essential in this process, helping to identify potential security issues and improve code quality.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Train developers and utilize resources<\/h3>\n\n\n\n<p>Regular training sessions keep developers updated on the latest security threats and best practices, empowering them to contribute actively to the organization\u2019s security posture. Utilizing well-maintained and trusted libraries and frameworks also plays a significant role in reducing the risk of vulnerabilities.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use secure API<\/h3>\n\n\n\n<p>When integrating external services or data, developers must ensure secure API use, validating and sanitizing any received data to prevent security breaches.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ensure the security of CI\/CD pipeline&nbsp;<\/h3>\n\n\n\n<p>Protecting the CI\/CD pipeline is paramount. This includes securing code repositories, ensuring the integrity of the deployment process, and conducting continuous vulnerability checks in the codebase and dependencies as an integral part of the build process. Additionally, focusing on environment protection and artifact integrity helps in safeguarding the application before and after it goes live.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Keep up with governance, compliance, and industry standards&nbsp;<\/h3>\n\n\n\n<p>To maintain a secure DevOps environment, it is imperative to integrate<strong> <\/strong>robust governance structures with adherence to industry standards and compliance requirements. This ensures a secure development lifecycle, consistent policy enforcement, and clear role definitions, all while aligning with recognized security benchmarks for comprehensive coverage throughout the software development and deployment phases.&nbsp;<\/p>\n\n\n\n<p>Key industry standards such as ISO 27001, SOC 2, PCI DSS, GDPR, and HIPAA provide a clear roadmap for secure operations, and their integration into DevOps practices is facilitated through automated compliance checks within the CI\/CD pipeline. This ensures continuous monitoring, prompt identification, and addressing of any deviations, enhancing the security measures in place.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Human supervision&nbsp;<\/h3>\n\n\n\n<p>Human oversight in AI integration within DevOps is essential to ensure a balanced and secure digital environment. While AI enhances efficiency in data processing and decision-making, human supervision is crucial, particularly when AI\u2019s decision-making is opaque or in critical scenarios.<\/p>\n\n\n\n<p>Humans bring ethical understanding, accountability, and common sense, ensuring AI operates within ethical boundaries and aligns with organizational objectives. This oversight helps in making strategic decisions, maintaining a robust security posture, and mitigating risks associated with AI vulnerabilities.<\/p>\n\n\n\n<p>By integrating human insight with AI capabilities, organizations can optimize their processes, safeguard against potential vulnerabilities, and ensure responsible and secure technology use. This approach ensures that AI-driven automation serves the organization\u2019s objectives while maintaining a secure and ethical environment.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure data handling and encryption&nbsp;<\/h3>\n\n\n\n<p>All sensitive information, whether in transit across networks or at rest in databases, must be encrypted using robust protocols such as TLS for data in transit and AES for data at rest. Key management is a critical aspect of this process, necessitating the use of secure key management systems and practices, including regular key rotations and using hardware security modules (HSMs) for storing encryption keys securely.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network security and segmentation&nbsp;<\/h3>\n\n\n\n<p>Network security is foundational to safeguarding the DevOps and AI ecosystem. Implementing network segmentation is a strategic move, isolating critical parts of the network to contain potential breaches and minimize lateral movement of threats. Employing secure communication protocols ensures that data is not only encrypted in transit but also authenticated, maintaining data integrity and confidentiality.&nbsp;<\/p>\n\n\n\n<p>To proactively defend against network threats, continuous monitoring of network traffic is essential. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) should be deployed to analyze network traffic for signs of malicious activity, enabling timely detection and response to potential threats. Additionally, implementing security groups and access control lists (ACLs) helps in defining and enforcing network access policies, ensuring that only authorized entities can communicate within the network.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Backup of your environment<\/h3>\n\n\n\n<p>Regular backups can help to overcome unpleasant situations, like outages and ransomware attacks. We shouldn\u2019t forget that backup is a final line of defense. Hence, to work successfully and guarantee your company&#8217;s data protection, your backup should follow backup best practices, including automated scheduled backups of all your data, the possibility of choosing storage, unlimited retention to keep your data for as long as you need, the 3-2-1 backup rule fulfillment, encryption, and ransomware protection.&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><em>You can read more about backup best practices:<\/em><br>\ud83d\udccc <a href=\"https:\/\/gitprotect.io\/blog\/github-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>GitHub backup best practices<\/em><\/a><br>\ud83d\udccc <a href=\"https:\/\/gitprotect.io\/blog\/bitbucket-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Bitbucket backup best practices<\/em><\/a><br>\ud83d\udccc <a href=\"https:\/\/gitprotect.io\/blog\/gitlab-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>GitLab backup best practices<\/em><\/a><br>\ud83d\udccc <a href=\"https:\/\/gitprotect.io\/blog\/jira-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Jira backup best practices<\/em><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>As we stand on the cusp of a new era in technology, the fusion of AI and DevOps promises to redefine the way we develop, deploy, and interact with digital solutions. AI algorithms will become more sophisticated, capable of self-healing and adapting to threats in real-time. However, attackers too will harness advanced AI, leading to an escalated arms race in cybersecurity. DevOps practices will further embrace edge computing and decentralized systems, spreading data across multiple nodes and potentially reducing single points of failure but also increasing the attack surface.<\/p>\n\n\n\n<p>One principle remains constant &#8211; the importance of continuous learning and adaptation. Security isn&#8217;t a one-time measure but an ongoing commitment. As threats evolve, so must our defenses. Organizations, developers, and security professionals alike must foster a culture of vigilance, always staying informed, always adapting, and always anticipating the next challenge. The fusion of AI and DevOps holds immense potential, but realizing this potential safely and securely is a journey, not a destination.<\/p>\n\n\n\n<p><em>Don\u2019t play hide-and-seek with cybercriminals &#8211; take proactive measures and protect your data.<\/em><br><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[FREE TRIAL] Ensure compliant DevOps backup and recovery with a 14-day trial<\/strong><\/a> \ud83d\ude80<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s plunge into the intricacies of AI vulnerabilities, the ways cybercriminals use AI, and the significance of DevOps security. Find out which practices can help you protect your data\u2026 small hint, backup is among them. Test a DevOps backup solution for free during a 14-day trial period.\u00a0 DevOps teams rely a lot on AI.. and here we speak not only about AI coding assistance tools\u2026 It boosts their productivity, saves time, and the list goes on and on. However, what about the risks organizations can run into taking AI for granted? Can it lead to data breaches or numerous vulnerabilities? [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":4570,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-4564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-git-backup-101","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking AI vs. DevOps security - how attackers impose their will on AI and how to protect your DevOps data - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking AI vs. DevOps security - how attackers impose their will on AI and how to protect your DevOps data - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s plunge into the intricacies of AI vulnerabilities, the ways cybercriminals use AI, and the significance of DevOps security. Find out which practices can help you protect your data\u2026 small hint, backup is among them. Test a DevOps backup solution for free during a 14-day trial period.\u00a0 DevOps teams rely a lot on AI.. and here we speak not only about AI coding assistance tools\u2026 It boosts their productivity, saves time, and the list goes on and on. However, what about the risks organizations can run into taking AI for granted? Can it lead to data breaches or numerous vulnerabilities? [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-23T14:50:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-06T08:40:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\"},\"author\":{\"name\":\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05\"},\"headline\":\"Hacking AI vs. DevOps security &#8211; how attackers impose their will on AI and how to protect your DevOps data\",\"datePublished\":\"2023-11-23T14:50:21+00:00\",\"dateModified\":\"2024-03-06T08:40:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\"},\"wordCount\":2697,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg\",\"articleSection\":[\"Git Backup 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\",\"name\":\"Hacking AI vs. DevOps security - how attackers impose their will on AI and how to protect your DevOps data - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg\",\"datePublished\":\"2023-11-23T14:50:21+00:00\",\"dateModified\":\"2024-03-06T08:40:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking AI vs. DevOps security &#8211; how attackers impose their will on AI and how to protect your DevOps data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05\",\"name\":\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png\",\"caption\":\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\"},\"description\":\"Milosz is Technical Content Writer at GitProtect, demonstrating fluency in both Polish and English, and a passion for language and technology. Currently pursuing a degree in Philosophy at UWE Bristol, he excels in creating engaging technical content that bridges the gap between users and the emerging technologies. Milosz leverages his writing skills and technical knowledge to author articles and blog posts, with a focus on DevOps, cyber-security, and potential cyber-threats, among other crucial IT topics. Additionally, valuable translations provided by Milosz further enhance GitProtect's communication and global outreach.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/milosz-jesis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking AI vs. DevOps security - how attackers impose their will on AI and how to protect your DevOps data - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/","og_locale":"en_US","og_type":"article","og_title":"Hacking AI vs. DevOps security - how attackers impose their will on AI and how to protect your DevOps data - Blog | GitProtect.io","og_description":"Let\u2019s plunge into the intricacies of AI vulnerabilities, the ways cybercriminals use AI, and the significance of DevOps security. Find out which practices can help you protect your data\u2026 small hint, backup is among them. Test a DevOps backup solution for free during a 14-day trial period.\u00a0 DevOps teams rely a lot on AI.. and here we speak not only about AI coding assistance tools\u2026 It boosts their productivity, saves time, and the list goes on and on. However, what about the risks organizations can run into taking AI for granted? Can it lead to data breaches or numerous vulnerabilities? [&hellip;]","og_url":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2023-11-23T14:50:21+00:00","article_modified_time":"2024-03-06T08:40:28+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg","type":"image\/jpeg"}],"author":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/"},"author":{"name":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05"},"headline":"Hacking AI vs. DevOps security &#8211; how attackers impose their will on AI and how to protect your DevOps data","datePublished":"2023-11-23T14:50:21+00:00","dateModified":"2024-03-06T08:40:28+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/"},"wordCount":2697,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg","articleSection":["Git Backup 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/","url":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/","name":"Hacking AI vs. DevOps security - how attackers impose their will on AI and how to protect your DevOps data - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg","datePublished":"2023-11-23T14:50:21+00:00","dateModified":"2024-03-06T08:40:28+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/11\/Hacking-AI.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/hacking-ai-vs-devops-security-how-attackers-impose-their-will-on-ai-and-how-to-protect-your-devops-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Hacking AI vs. DevOps security &#8211; how attackers impose their will on AI and how to protect your DevOps data"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05","name":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png","caption":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io"},"description":"Milosz is Technical Content Writer at GitProtect, demonstrating fluency in both Polish and English, and a passion for language and technology. Currently pursuing a degree in Philosophy at UWE Bristol, he excels in creating engaging technical content that bridges the gap between users and the emerging technologies. Milosz leverages his writing skills and technical knowledge to author articles and blog posts, with a focus on DevOps, cyber-security, and potential cyber-threats, among other crucial IT topics. Additionally, valuable translations provided by Milosz further enhance GitProtect's communication and global outreach.","url":"https:\/\/gitprotect.io\/blog\/author\/milosz-jesis\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=4564"}],"version-history":[{"count":7,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4564\/revisions"}],"predecessor-version":[{"id":5031,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4564\/revisions\/5031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/4570"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=4564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=4564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=4564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}