AI CODING TOOL SECURITY

Apps built with AI coding tools ship with predictable security gaps. Lovable, Cursor, Bolt, Replit, Claude Code, v0, Devin, Windsurf — different tools, same patterns. This hub is the complete index: tool-by-tool risk profiles, the 14 vulnerabilities common to all, and the workflow to ship safe AI-generated code.

Where to start

If you’re trying to figure out how secure AI coding is in general, start with Vibe Coding Vulnerabilities — the 14 patterns that ship in nearly every AI-built app.

If you’re evaluating a specific tool, jump to its risk profile below.

If you’re shipping AI-generated code to production today, the Vibe Code Scanner finds the patterns in your live app in under 60 seconds.

The pattern across every AI coding tool

Across 1,400+ scanned applications, the same 14 vulnerability patterns recur regardless of tool. The top 5 by incident count:

  1. Missing Row Level Security on Supabase / Firebase tables (~70% of backed-by-Supabase apps)
  2. Hardcoded API keys in frontend bundles (~25% of vibe-coded apps)
  3. BOLA / IDOR on CRUD endpoints (~85% of apps with CRUD APIs)
  4. Missing input validation (near universal)
  5. Over-permissive CORS (~40% of vibe-coded APIs)

Full taxonomy in Vibe Coding Vulnerabilities.

Tool-by-tool risk profiles

Editor-based AI tools

Cloud-based AI builders

Autonomous AI agents

Fundamentals

The vulnerability taxonomy

Best practices

Hardening guides

The four-layer defense

Every team shipping AI-generated code needs all four. Skip a layer and the others can’t compensate:

Layer 1 — Lock down what AI sees

.cursorignore (or equivalent for your tool) on every repo. Privacy Mode enabled. MCP servers audited. Codebase context excludes secrets, infra-as-code, customer data fixtures.

Layer 2 — Gate what AI’s output ships

Branch protection on main. Required PR review for every AI-generated commit. PR template that flags AI-generated portions for reviewer focus.

Layer 3 — Static security scan in CI

Secret detection (gitleaks). Dependency audit. Static analysis for the AI-pattern bugs from the vulnerability taxonomy. Block merge on critical.

Layer 4 — Dynamic scan on every deploy

Static catches patterns in source. Dynamic catches the bugs that only surface at runtime — RLS gaps, BOLA, CORS, JWT verification. The Vibe Code Scanner runs against the deployed app in under 60 seconds.

Free tools

Browse safety reviews by category

SCAN YOUR AI-BUILT APP

14-day trial. No card. Results in under 60 seconds.

START FREE SCAN