Concentrated Compute as a Cybersecurity Risk
concentrated-compute-cybersecurity-riskriskPath: /knowledge-base/risks/concentrated-compute-cybersecurity-risk/
E689Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "concentrated-compute-cybersecurity-risk",
"numericId": null,
"path": "/knowledge-base/risks/concentrated-compute-cybersecurity-risk/",
"filePath": "knowledge-base/risks/concentrated-compute-cybersecurity-risk.mdx",
"title": "Concentrated Compute as a Cybersecurity Risk",
"quality": 64,
"readerImportance": 62.5,
"researchImportance": 23,
"tacticalValue": 72,
"contentFormat": "article",
"tractability": null,
"neglectedness": null,
"uncertainty": null,
"causalLevel": null,
"lastUpdated": "2026-03-13",
"dateCreated": "2026-02-20",
"llmSummary": "Analyzes how \\$700B+ in AI infrastructure concentrated across 5-6 companies creates correlated cybersecurity vulnerabilities via NVIDIA hardware monoculture (90-95% market share), physical clustering (50% of US data centers in two regions), and software stack convergence, with no mandatory regulatory framework analogous to NERC CIP or PCI DSS. Concludes the regulatory gap is widening as investment scales, and identifies training data poisoning, weight exfiltration, and compute hijacking as primary attack vectors.",
"description": "The concentration of \\$700B+ in AI infrastructure across 5-6 US companies creates a novel cybersecurity risk surface where hardware monoculture, physical concentration, and software supply chain dependencies mean a single vulnerability or attack could compromise a significant fraction of global frontier AI compute.",
"ratings": {
"focus": 8.5,
"novelty": 5.5,
"rigor": 6,
"completeness": 7.5,
"concreteness": 7.5,
"actionability": 5.5,
"objectivity": 7
},
"category": "risks",
"subcategory": "structural",
"clusters": [
"ai-safety",
"governance"
],
"metrics": {
"wordCount": 2015,
"tableCount": 3,
"diagramCount": 0,
"internalLinks": 9,
"externalLinks": 0,
"footnoteCount": 0,
"bulletRatio": 0.22,
"sectionCount": 20,
"hasOverview": true,
"structuralScore": 11
},
"suggestedQuality": 73,
"updateFrequency": 180,
"evergreen": true,
"wordCount": 2015,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 0,
"backlinkCount": 1,
"hallucinationRisk": {
"level": "medium",
"score": 60,
"factors": [
"no-citations",
"few-external-sources"
]
},
"entityType": "risk",
"redundancy": {
"maxSimilarity": 18,
"similarPages": [
{
"id": "compute-concentration",
"title": "Compute Concentration",
"path": "/knowledge-base/risks/compute-concentration/",
"similarity": 18
},
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 15
},
{
"id": "ai-safety-institutes",
"title": "AI Safety Institutes",
"path": "/knowledge-base/responses/ai-safety-institutes/",
"similarity": 14
},
{
"id": "monitoring",
"title": "Compute Monitoring",
"path": "/knowledge-base/responses/monitoring/",
"similarity": 14
},
{
"id": "responsible-scaling-policies",
"title": "Responsible Scaling Policies",
"path": "/knowledge-base/responses/responsible-scaling-policies/",
"similarity": 14
}
]
},
"coverage": {
"passing": 4,
"total": 13,
"targets": {
"tables": 8,
"diagrams": 1,
"internalLinks": 16,
"externalLinks": 10,
"footnotes": 6,
"references": 6
},
"actuals": {
"tables": 3,
"diagrams": 0,
"internalLinks": 9,
"externalLinks": 0,
"footnotes": 0,
"references": 0,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"llmSummary": "green",
"schedule": "green",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "amber",
"diagrams": "red",
"internalLinks": "amber",
"externalLinks": "red",
"footnotes": "red",
"references": "red",
"quotes": "red",
"accuracy": "red"
},
"ratingsString": "N:5.5 R:6 A:5.5 C:7.5"
},
"readerRank": 215,
"researchRank": 469,
"recommendedScore": 180.91
}External Links
No external links
Backlinks (1)
| id | title | type | relationship |
|---|---|---|---|
| ai-compute-scaling-metrics | AI Compute Scaling Metrics | analysis | — |