Bad Vibes: AI-Generated Code is Vulnerable, Researchers Warn
Apr 13, 2026 —
Vibe coding programmers are releasing batches of vulnerable code, according to researchers at the School of Cybersecurity and Privacy (SCP) at Georgia Tech, who have scanned over 43,000 security advisories across the web.
The programming style relies on using generative artificial intelligence (AI) to create software code using tools like Claude, Gemini, and GitHub Copilot. According to graduate research assistant Hanqing Zhao of the Systems Software & Security Lab (SSLab), no one had been tracking these common vulnerabilities and exposures before the launch of their Vibe Security Radar.
“The vulnerabilities we found lead to breaches,” he said. “Everyone is using these tools now. We need a feedback loop to identify which tools, which patterns, and which workflows create the most risk.”
The radar extensively scans public vulnerability databases, finds the error for each vulnerability, and then examines the code’s history to find who introduced the bug. If they discover an AI tool's signature, the radar flags it.
Of the 74 confirmed cases uncovered so far by the tool, 14 are critical risks, and 25 are high. These vulnerabilities include command injection, authentication bypass, and server-side request forgery. Zhao explained that since AI models tend to repeat the same mistakes, an attacker would need to find these bugs just once.
“Millions of developers using the same models means the same bugs showing up across different projects,” he said. “Find one pattern in one AI codebase, you can scan for it across thousands of repositories.”
Despite its success, the team has only scratched the surface of the problem. The radar can trace metadata like co-author tags, bot emails, and other known tool signatures, but it can't identify an issue if these markers have been removed.
The next step is behavioral detection. AI-written code has patterns in how it names variables, structures functions, and handles errors.
“We're building models that can identify AI code from the code itself, no metadata needed,” said Zhao. “That opens up a lot of cases we currently can't touch.”
The team is also improving its verification pipeline and expanding its sources to include more vulnerability databases. The goal is to get a more complete picture of AI-introduced vulnerabilities across open source, not just the ones that happen to leave signatures behind.
As more programmers rely on vibe coding, Zhao warns that it still needs to be reviewed as thoroughly as any other project.
“The whole point of vibe coding is not reading it afterward, I know,” he said. “But if you're shipping AI output to production, review it the way you'd review a junior developer's pull request. Especially anything around input handling and authentication.”
When prompting AI, SSLab also recommends providing more detailed instructions to get it closer to production-ready. There are also tools to check the code for vulnerabilities after code it has been generated. Not double-checking could lead to a catastrophe.
“The attack surface keeps growing,” said Zhao. “More people running AI agents locally means the attacker doesn't need to break into the company infrastructure. They just need one vulnerability in a model context protocol server that someone installed and never reviewed.”
One reason the attack surfaces are expanding rapidly is AI’s evolution. In the second half of 2025, the Vibe Security Radar found about 18 cases across seven months. Then, in the first three months of 2026, it identified 56. March 2026 alone had 35, more than all of 2025 combined.
Many tools, like Claude, are now more autonomous, allowing developers to write entire features, create files, and even make architecture decisions.
“When an agent builds something without authentication, that's not a typo,” said Zhao. “It's a design flaw baked in from the start. Claude Code and Copilot together account for most of what we detect, but that's partly because they leave the clearest signatures.”
John Popham
Communications Officer II at the School of Cybersecurity and Privacy
Unveiling METALLIC: A Multi-Million Dollar Investment into Cybersecurity
Nov 20, 2024 —
Researchers are receiving more than $4 million from DARPA to develop a new framework to analyze and model sophisticated attacks on software.
A common tactic cybercriminals use is an exploit chain, a series of interconnected steps or vulnerabilities that attackers exploit to breach software systems. Each step leverages the capability achieved in the preceding step, forming a systematic pathway to compromise.
Recognizing the severity of this threat, researchers at the School of Cybersecurity and Privacy (SCP) at Georgia Tech will work with Trusted Science and Technology Inc. to turn Metrology for Assessing the Leverage of and Liability for Compromises (METALLIC) into a working prototype of a security modeling and assessment framework.
“We are developing a foundation framework to analyze and reason about cyber chains of exploits,” said Sukarno Mertoguno, SCP research professor and project lead.
“The structure we will implement in this project enables characterization and evaluation of exploit components, semi-automated repair, and adaptation of the chain to the changes in operating environment.”
The METALLIC project holds significant promise for advancing cybersecurity practices. For instance, METALLIC could help organizations detect and neutralize exploit chains faster, reducing the average time to identify and mitigate a breach from days to hours.
By providing a comprehensive framework for modeling, analyzing, and mitigating exploit chains, METALLIC has the potential to empower security professionals with the tools and knowledge needed to better protect software systems from sophisticated cyberattacks.
This project represents an important step towards a more secure digital future, where individuals and organizations can confidently engage in online activities without fear of compromise.
Researchers and engineers with extensive expertise in various cybersecurity domains will spearhead the METALLIC project.
Mertoguno will lead the Georgia Tech team and be responsible for system security, systems-centric models, and scalable analysis. Wenke Lee, a professor at SCP, is responsible for vulnerability research, especially on mobile devices. Taesoo Kim, a professor at SCP, is responsible for exploit discovery and chaining. Brendan Saltaformaggio, an associate professor at SCP, will focus on root cause analysis.
John Popham
Communications Officer II
School of Cybersecurity and Privacy