Shadow AI Tools: 80% of Employees Use Them, Only 12% of Companies Govern Them

Close-up of a developer's hands on a mechanical keyboard, with a monitor displaying code and a coffee mug nearby.

Enterprise employees now run shadow AI tools faster than security programs can review them, and the gap has become the year’s most consequential identity-management question. Adaptive Security‘s research finds 80% of employees use unapproved generative AI applications at work while only 12% of companies have a formal AI governance policy in place. The 8-to-1 gap exposes corporate data through OAuth scopes and browser sessions that never touch the corporate network.

  • Adaptive Security finds 80% of employees currently use unapproved generative AI applications at work, against 12% of companies that have a formal AI governance policy.
  • Most employees run three to five AI tools on any given day. A significant portion connect to corporate data through OAuth tokens or browser sessions that bypass network-layer controls entirely.
  • Three discovery surfaces account for nearly all shadow AI tools activity: OAuth connections, browser extensions, and AI features bundled inside already-approved suites like Microsoft Copilot and Google Gemini.

Where the Shadow AI Tools Surface Actually Lives Inside an Enterprise

Shadow AI tools are not a generic awareness problem. They are a specific identity-management problem with three distinct surfaces. OAuth connections grant third-party AI tools read or write permissions against Google Workspace or Microsoft 365. A quarterly audit of connected third-party apps sorted by permission scope routinely surfaces dozens of tools the security team never reviewed. Browser extensions run AI features client-side and never touch the operating system, so endpoint management tools miss them entirely. AI features bundled into already-approved suites – Microsoft Copilot, Google Gemini, Salesforce Einstein – inherit those suites’ trusted status while introducing new data flows that were not part of the original approval.

The traditional network-monitoring playbook does not address any of these three surfaces. A browser-based AI tool that authenticates through a quick OAuth approval and pulls shared-drive contents through the same channel does not appear in firewall logs or DLP-monitored email. The security team’s visibility ends at the network edge. The data exposure happens inside the SaaS perimeter where the employee, the SaaS provider, and the AI vendor are the only parties on the wire.

Why the BleepingComputer Framing Buries the OAuth-Scope Problem

The Adaptive Security writeup, as reported by BleepingComputer, frames the issue as a productivity-versus-security tradeoff and offers a five-step adoption program as the answer. That framing under-emphasizes the more structural finding buried in the OAuth data: the AI tools themselves are not the long-term governance problem – the OAuth scopes they hold are. Tools come and go; the access scopes they accumulated against Workspace, Microsoft 365, GitHub, Salesforce, and Slack persist after the tools fall out of favor. Few organizations have a routine for revoking stale third-party app authorizations. A revoked-OAuth quarterly cadence is the closest operational analogue to the patch-Tuesday discipline that vulnerability programs run; most identity programs do not yet run it.

The data point most worth bringing into a board conversation is not the 80% adoption number. It is the gap between approved-tool inventory and OAuth-app inventory. The first number is what the security team thinks the AI surface looks like; the second is what it actually looks like. The delta is the shadow AI tools program’s scope.

How CISOs Should Build the Shadow AI Visibility Function Without Slowing Employees

Discovery is upstream of policy, and policy is upstream of approval workflow; the sequence determines how much organic momentum the program retains. The incident response posture for AI exposure depends on knowing what is connected before something goes wrong.

Run a quarterly third-party OAuth audit against Workspace, Microsoft 365, and GitHub – Pull the connected-apps list sorted by permission scope and tenure, flag every app the security team did not review, and revoke any that hold scopes broader than their declared purpose. This is the single operation that gives the security team visibility into the OAuth-surface dimension of shadow AI tools.

Stand up an approved-AI catalog with a fast-track review path before broad policy enforcement – Employees adopt unapproved tools because the approval workflow takes weeks; the catalog gives them a faster alternative with the OAuth scopes pre-negotiated. The fast-track review path – 48 hours for an open-source tool, 2 weeks for a SaaS vendor – removes the productivity-friction reason that drives shadow adoption in the first place.

Shadow AI tools are not a problem to solve once. They are a posture to maintain quarterly against an adoption surface that grows faster than any single approval workflow can keep pace with. The visibility cadence built this year will determine how exposed the organization is when the next generation of agentic AI tools arrives with broader OAuth scopes than anything in the current inventory.

Join our LinkedIn group Information Security Community!

Holger Schulze
Holger Schulze is the founder and publisher of Cybersecurity Insiders, an independent cybersecurity media and research company. The publication centers on the security domains under the most pressure from AI: identity and phishing resistance, incident response velocity, application security, and threat intelligence tradecraft. Coverage maps the readiness gap between where CISO teams sit today and where AI-era attack speed is pushing them, and which moves close it fastest. Writing here applies Cybersecurity Insiders' Capability and Coherence Maturity Model to primary-research data and named incident analysis, evaluating security programs across the reactive, managed, and adaptive maturity tiers. Holger moderates the Information Security Community on LinkedIn, one of the largest cybersecurity professional networks. Connect at linkedin.com/in/holger-schulze.

No posts to display