Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

March 27, 2026

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

March 27, 2026

OpenAI Expands Bug Bounty to Cover AI Abuse and ‘Safety’ Concerns

March 27, 2026
Facebook X (Twitter) Instagram
Friday, March 27
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code
News

Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

Team-CWDBy Team-CWDMarch 26, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Vibe coding tools like Anthropic’s Claude Code are flooding software with new vulnerabilities, Georgia Tech researchers have warned.

At least 35 new common vulnerabilities and exposures (CVE) entries were disclosed in March 2026 that were the direct result of AI-generated code. This is up from from six in January and 15 in February.

The vulnerabilities are being tracked as part of the ‘Vibe Security Radar’ project which was started in May 2025 by the Systems Software & Security Lab (SSLab), part of Georgia Tech’s School of Cybersecurity and Privacy.

How Georgia Tech Tracks Flaws Introduced by AI Coding Tools

The Vibe Security Radar aims to track vulnerabilities directly introduced by AI coding tools that made it into public advisories, such as the CVE.org, the US National Vulnerability Database (NVD), GitHub Advisory Database (GHSA), Open Source Vulnerabilities (OSV), RustSec and others.

Speaking to Infosecurity, Hanqing Zhao, founder of the Vibe Security Radar, “Everyone is saying AI code is insecure, but nobody is actually tracking it. We want real numbers. Not benchmarks, not hypotheticals, real vulnerabilities affecting real users.”

He emphasized that this tracking work was fundamental now that more people have stated vibe coding entire projects “straight to production.”

“Realistically, even teams that do code review aren’t going to catch everything when half the codebase is machine-generated,” he added.

50 Vibe Coding Tool Covered, 74 Vulnerabilities Tracked

Zhao claimed that his team tracks approximately 50 AI-assisted coding tools, including Claude Code, GitHub Copilot, Cursor, Devin, Windsurf, Aider, Amazon Q and Google Jules.

To develop the Vibe Security Radar dashboard, researchers first pull data from public vulnerability databases, find the commit that fixed each vulnerability, then trace backwards to find who introduced the bug in the first place.

“If that commit has an AI tool’s signature on it, like a co-author tag or a bot email, we flag it,” Zhao told Infosecurity.

Finally, the team uses AI agents to “understand the root cause of each vulnerability and determine whether AI-generated code contributed to it.”

“The agents have access to the actual Git repository and commit history, so they can do a real investigation, not just pattern matching,” he said.

Out of the 74 confirmed cases of CVEs that were directly due to the use of AI coding tools, Claude Code showed up the most, but Zhao noted that this is mostly because the Anthropic tool “always leaves a signature.”

“Tools like Copilot’s inline suggestions leave no trace at all, so they’re harder to catch,” he added.

This domination of Claud Code-introduced flaws could also come from the widespread use of the tool in the software development community.

Read now: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards

Open-Source Projects Hide Most AI-Linked Flaws

However, Zhao admitted that the real number of CVEs due to the use of AI coding tools “is almost certainly higher” than the one shown on the Vibe Security Radar dashboard.

“These are just the cases that leave metadata traces. Based on what we see in projects like that, we estimate five to 10 times what we currently detect, roughly 400 to 700 cases across the open-source ecosystem,” he said.

“Take OpenClaw for example. It has over 300 security advisories, and we know the project relies heavily on vibe coding. But most of the AI tool traces have been stripped by the authors, so we can only confirm around 20 cases with clear AI signals.”

Additionally, there are a lot of vulnerabilities that never get public identifiers (e.g. CVE or GHSA number), which therefore cannot be tracked as easily.

Furthermore, Zhao is convinced that the number of vulnerabilities induced by AI coding tools is “only going to grow.”

“Last month, Claude Code alone accounted for over 4% of public commits on GitHub and that number is still climbing. More AI code means more AI-introduced vulnerabilities,” he said.

The Vibe Security Radar is a long-term project that he and his team will keep improving.

“Right now, we rely on metadata like co-author tags and bot emails, but people strip those. The next step is looking at the bigger picture: the project as a whole, commit patterns and the overall coding style. AI-written code has a recognizable feel to it. We’re working on models that can pick up on those signals without needing any explicit metadata,” he concluded.

Image credit: aileenchik / Shutterstock.com

Read more: Palo Alto Networks Introduces New Vibe Coding Security Governance Framework



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleClaude Code Security and Magecart: Getting the Threat Model Right
Next Article Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
Team-CWD
  • Website

Related Posts

News

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

March 27, 2026
News

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

March 27, 2026
News

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

March 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

What’s at stake if your employees post too much online

December 1, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.