LingVo.club
📖+40 XP
🎧+25 XP
+45 XP
Researchers find 'vibe coding' linked to insecure AI-written code — Level B2 — Coding on a dark theme computer screen

Researchers find 'vibe coding' linked to insecure AI-written codeCEFR B2

24 Apr 2026

Level B2 – Upper-intermediate
6 min
305 words

Researchers report that a programming style called "vibe coding" is releasing batches of vulnerable code created with generative AI assistance. The Vibe Security Radar, built by the Systems Software & Security Lab (SSLab) at Georgia Tech, scanned public vulnerability sources and found many examples where AI tools contributed insecure code. The teams analysed over 43,000 security advisories to reach these findings.

Graduate research assistant Hanqing Zhao explains how the radar works: it locates the error for each vulnerability, inspects the code's history to find who introduced the bug, and looks for AI tool signatures. The radar has confirmed 74 cases so far — 14 labelled critical and 25 labelled high — including command injection, authentication bypass and server-side request forgery. Zhao notes that AI models often repeat the same mistakes, so millions of developers using the same models can produce the same bugs across projects.

The radar currently traces metadata such as co-author tags and bot emails but cannot identify cases when those markers are removed. The team is moving toward behavioral detection that reads naming patterns, function structure and error handling to find AI-written code without metadata. Researchers are also improving verification and expanding the sources they scan.

  • Detection can use metadata like co-author tags and bot emails.
  • Behavioral models aim to identify AI code from the code itself.
  • Researchers recommend careful review of AI output, especially input handling and authentication.

Zhao warns that as AI agents grow more autonomous — building features, creating files and making architecture decisions — the attack surface increases. In the second half of 2025 the radar found about 18 cases across seven months, then 56 cases in the first three months of 2026; March 2026 alone had 35, more than all of 2025 combined. Claude Code and Copilot account for most detections, partly because they leave the clearest signatures.

Difficult words

  • vulnerabilitya weakness that attackers can exploit
  • generativeproduced by a machine learning model
  • metadatadata that describes other data
  • behavioralrelated to patterns of how code behaves
  • authenticationprocess that confirms a user's identity
  • attack surfaceall possible points an attacker can target
  • signaturea unique pattern left by a tool
    signatures
  • verificationchecking that code works and is safe

Tip: hover, focus or tap highlighted words in the article to see quick definitions while you read or listen.

Discussion questions

  • What risks arise when many developers use the same AI models, and how could teams reduce those risks?
  • How might behavioral detection change the way organisations find AI-written code without metadata?
  • Should companies require metadata like co-author tags from AI tools to help detection? Why or why not?

Related articles

Searching for Life on Exoplanets — Level B2
1 Dec 2025

Searching for Life on Exoplanets

Since a 1995 discovery, astronomers have found over 4,000 exoplanets. Scientists study biosignatures and technosignatures to learn if life or technology exists elsewhere. A NASA grant supports Adam Frank's work on technosignatures.

Metal tubes that do not sink — Level B2
4 Feb 2026

Metal tubes that do not sink

Researchers developed treated metal tubes whose inner surface traps air and stays dry, so the tubes float even in rough water. The design could lead to floating rafts for ships, buoys and wave energy devices.