The build was ready to ship, but the security audit failed. The culprit: a broken password rotation policy tied to a small language model handling sensitive API calls.
Password rotation policies set the rules for how often and under what conditions passwords — or API keys — must change. With a small language model in the loop, these policies matter more. LLMs are powerful. They also ingest prompts, system messages, and cached secrets if not carefully controlled. If your rotation rules are weak, stale credentials can leak into logs or model training data.
A modern password rotation policy should define:
- Rotation intervals based on threat models, not arbitrary dates.
- Automated invalidation and regeneration of credentials.
- Integration with secrets managers, CI/CD pipelines, and LLM input sanitization.
- Immediate rotation triggers on detected compromise or anomalous activity.
Small language models multiply risk vectors. They can be embedded in services that sit between APIs and end-users. If compromised, they become a silent relay for expired passwords. A secure rotation process prevents compromised credentials from surviving long enough to be exploited.