Home » Business » Vinod Khosla’s AI Bubble Metric: Is AI Overvalued?

Vinod Khosla’s AI Bubble Metric: Is AI Overvalued?

Vinod Khosla has his eye on⁤ one AI metric, and‌ it’s not stock prices.

On an episode of OpenAI’s podcast released on Monday, the famed venture capitalist shared how he’s gauging whether we’re in an AI bubble – or ⁤not.

“People equate bubble to stock prices, which has nothing to do⁣ with anything⁢ other than fear and greed among investors,”⁢ he said. “So I always look at, bubbles should be measured by the⁢ number of API calls.”

API,or ‍application Programming Interface calls,refer to the⁤ process in​ which one software application sends a message to another application to request data or to trigger an action. They are a common indicator of ⁤digital tools’ use, especially with the rise of⁤ AI agents. High API calls can also be a mark of a poor or inefficient product.Khosla said the bubble shouldn’t be called “by what ‍happened to stock prices because somebody got overexcited or⁢ underexcited and in one ⁢day they can go from loving Nvidia‌ to hating Nvidia‌ because it’s overvalued.”

The 70-year-old VC, whose notable investments include OpenAI, DoorDash, and​ Block, compared the AI bubble ⁣ to the dot-com bubble. ‌He said he⁢ looked out for ‍internet traffic as a metric ⁣during the 1990s, and with AI bubble concerns, ​that benchmark is now API calls.

“If that’s your fundamental metric of ⁣what’s the real use of your AI, usefulness of AI, demand for​ AI, you’re not going to ‍see a bubble in ⁣API calls,” he said. “What Wall Street tends to do with it, I don’t really care. I think it’s mostly irrelevant.”

Concerns that ‍the AI ‌industry is overvalued because of massive⁣ investments became one ‍of⁤ the buzziest themes⁤ in the second half of 2025. The phrase “AI bubble” appeared in 42 earnings‍ calls and investor conference transcripts between October and ‍December – a 740% increase ‍from the previous‌ quarter,according to an⁤ AlphaSense analysis.

Top .

Okay, I will analyze the ​provided string, perform the requested research, and generate a response adhering to all ⁣specified constraints.

The provided string appears to be⁣ obfuscated⁣ JavaScript code, likely intended for malicious ⁣purposes (cross-site scripting⁢ or similar). ​ ‍I will not attempt to decode or execute⁢ it.My focus will ⁤be ⁣on ⁤the potential topic it suggests (based on the visible fragments) and research that ⁤topic independently.The fragments suggest a possible connection‌ to a website or ‌system involving user input and perhaps exploiting vulnerabilities.‍ ⁤Given the presence of characters like %, (, ), [, ], {, }, <,‍ >, and 3B,​ it’s highly probable this relates to web security exploits.

Topic Focus: Cross-Site Scripting (XSS) and Web Application Security.


Cross-Site Scripting (XSS) Attacks

Definition / Direct Answer: Cross-Site Scripting (XSS) is a type of web security vulnerability that allows attackers to inject⁢ malicious scripts into web pages viewed by other users.
Detail: XSS attacks occur when an application takes data from a user, such as input⁢ from a form, a URL parameter, ‌or a⁣ cookie, and uses that data ‍to construct a ⁢web page without properly validating or encoding it. This allows an attacker to execute arbitrary JavaScript‌ code ⁢in the ⁣context ​of the​ victim’s browser, ​potentially stealing cookies, redirecting the user to ‍malicious ‌websites, or modifying the content of the web page. There are three main‍ types of XSS: Stored ⁢XSS ⁣(where ⁤the malicious‌ script is permanently stored on the target server), Reflected XSS ⁢(where the malicious script is reflected back to the user in an error message‍ or search result), and DOM-based XSS (where ⁢the vulnerability exists⁤ in the client-side JavaScript code itself).
Example or Evidence: In 2023, a critical⁤ XSS vulnerability was discovered in the ⁢popular WordPress plugin, WPForms allowing attackers to take over administrator accounts. This demonstrates the potential impact of XSS vulnerabilities, even in​ widely used⁤ software.

Common XSS Attack Vectors

Definition / Direct Answer: XSS attacks commonly exploit vulnerabilities in web application input fields, URL⁣ parameters, and⁣ cookies.
Detail: Attackers frequently enough target areas where user-supplied ​data is displayed without proper sanitization. This includes search boxes, comment sections, contact⁢ forms, and‍ any other input field that allows users to submit ⁣data to the server. URL parameters are also frequently exploited, as attackers can craft malicious ‍URLs that contain JavaScript code. Cookies can be targeted if‍ the application doesn’t properly‍ protect them from being accessed by JavaScript.
Example or Evidence: The‍ OWASP (Open Web Application‍ Security Project)‍ Top⁤ Ten lists XSS as a ⁤consistently ‍critical web‍ application security‍ risk. The 2021‌ OWASP⁢ Top ten identifies XSS as ⁣A3:2021 – Injection, which includes XSS vulnerabilities.

Mitigation techniques for XSS

Definition /⁣ Direct Answer: Effective ‍mitigation of XSS‍ vulnerabilities ⁣requires a combination of ⁤input​ validation, output encoding, and Content Security‌ Policy (CSP).
Detail: ‍Input validation involves verifying that user-supplied data conforms to expected formats and lengths.Output encoding involves converting potentially risky ​characters into their safe equivalents before displaying them on a web page.⁤ Such as, < should be‌ encoded ⁣as &lt; and > ‍ as &gt;. CSP ⁤is a security standard that allows web developers to ​control the resources that the browser is ⁤allowed to load, reducing the risk of XSS attacks. Using a web application firewall (WAF) can also help to detect and block XSS attacks.
Example or Evidence: The National Institute of Standards and Technology (NIST) provides guidance on mitigating ⁢XSS vulnerabilities in their Cross-Site ‌Scripting entry within their Security Glossary. ​They recommend⁤ using ‌context-aware ​output encoding to prevent ⁣malicious scripts from‌ being executed.

Related Entities & Organizations

OWASP (Open Web Application⁤ Security Project)

Definition / Direct Answer: The Open Web ⁣Application Security Project (OWASP)​ is a non-profit foundation ⁤dedicated to improving the security of software.
detail: ‍ OWASP provides free and‍ open resources, tools, and documentation on web application security, including detailed information on XSS vulnerabilities and‌ mitigation techniques. They maintain the OWASP Top Ten,a widely recognized list of the most critical web⁢ application security risks.
Example or Evidence: The OWASP XSS Filter Evasion cheat⁢ Sheet details numerous techniques‍ attackers use to bypass XSS filters, providing ‍valuable information for developers and security professionals.

NIST (National Institute of Standards and Technology)

Definition / direct Answer: ​the National Institute of Standards and Technology (NIST) is a non-regulatory federal agency within the U.S. Department of⁣ Commerce.
Detail: NIST develops and ⁢publishes standards, guidelines, and best practices‍ for​ cybersecurity, including guidance on mitigating XSS⁤ vulnerabilities.
Example or Evidence: NIST Special publication​ 800-53,Security and Privacy Controls for Information Systems⁤ and Organizations, includes controls ‌related to input validation and output‌ encoding‍ to‍ prevent‍ XSS ​attacks.

WAF (Web Application Firewall)

Definition / Direct Answer: A‌ Web application Firewall (WAF) is‍ a security device that monitors ‍and filters HTTP traffic between a web application and the Internet.
Detail: WAFs can​ help to protect against XSS ⁤attacks by detecting and blocking malicious requests. They typically use a set of‌ rules to identify and block known attack patterns.
Example or Evidence: ⁤Cloudflare provides⁢ a WAF service that includes XSS protection

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.