DiscoverLessWrong (30+ Karma)“Rogue internal deployments via external APIs” by Fabien Roger, Buck
“Rogue internal deployments via external APIs” by Fabien Roger, Buck

“Rogue internal deployments via external APIs” by Fabien Roger, Buck

Update: 2025-10-16
Share

Description

Once AI companies build powerful AIs, they may:

  • Give internal AIs access to sensitive internal privileges (e.g. access to the internal infra that touches model weights, help with training of the next generation of AIs, …);
  • Have mitigations specific to those internal deployments enforced via monitoring of the internal LLM API;
  • Have an external API deployment without those mitigations.

In this situation, an internal AI may build an agent scaffold that makes calls to the external API and uses the internal sensitive privileges. Such agent scaffold would be in a better position to cause a catastrophe because it would not be subject to the same monitoring as the internal API. I call this a rogue internal deployment via external APIs. (It is “internal” because the model weights and the agent scaffold never leave the cluster.)

I think preventing those is similarly important from a misalignment perspective as preventing [...]

---

Outline:

(01:43 ) Rogue internal deployments via external APIs

(03:29 ) A variation: rogue internal deployments via cross-company APIs

(04:28 ) A possible mitigation: preventing the creation of scaffolds that use external LLM APIs via monitoring

(06:29 ) Why I am more pessimistic about other solutions

(06:34 ) Monitoring the external API

(08:47 ) Preventing access to external APIs

(10:22 ) Monitoring access to sensitive permissions

(10:57 ) Final thoughts

---


First published:

October 15th, 2025



Source:

https://www.lesswrong.com/posts/fqRmcuspZuYBNiQuQ/rogue-internal-deployments-via-external-apis


---


Narrated by TYPE III AUDIO.


---

Images from the article:

System architecture diagram showing internal and external LLM API connections.
System architecture diagram showing internal and external LLM API connections with scaffolds.
System architecture diagram showing LLM API connections and internal scaffolds.
Flow diagram showing security vulnerability between internal and external LLM APIs.
System architecture diagram showing internal and external LLM API connections and permissions.

Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

“Rogue internal deployments via external APIs” by Fabien Roger, Buck

“Rogue internal deployments via external APIs” by Fabien Roger, Buck