CISA Acting Director Reportedly Uploaded Sensitive Government Documents to Public ChatGPT Instance

July 15, 2025

The Acting Director of the Cybersecurity and Infrastructure Security Agency (CISA), Madhu Gottumukkala, reportedly uploaded sensitive government documents marked 'for official use only' into a public instance of ChatGPT. This action triggered automated cybersecurity alerts and initiated a Department of Homeland Security review to evaluate potential information exposure risks.

This incident underscores the importance of safe and secure AI practices. It highlights the need for robust governance, mapping, and management of such systems to prevent similar incidents in the future. For those interested in shaping responsible AI governance and contributing to Project Cerebellum's harm prevention efforts, JOIN US.

The HISPI Project Cerebellum TAIM initiative aims to Govern, Map, Measure, and Manage such incidents to ensure the development and deployment of trustworthy AI.

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
madhu-gottumukkala
Alleged developer
openai
Alleged harmed parties
united-states-department-of-homeland-security, cybersecurity-and-infrastructure-security-agency, united-states-government, national-security-and-intelligence-stakeholders

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/1360

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.