{"id":7974,"date":"2025-09-18T12:45:24","date_gmt":"2025-09-18T10:45:24","guid":{"rendered":"https:\/\/deltasource.eu\/?p=7974"},"modified":"2025-09-19T10:09:07","modified_gmt":"2025-09-19T08:09:07","slug":"secure-coding-and-ai","status":"publish","type":"post","link":"https:\/\/deltasource.eu\/en\/secure-coding-and-ai\/","title":{"rendered":"Secure coding and AI &#8211; Not always best friends"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7974\" class=\"elementor elementor-7974 elementor-7945\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fc008e e-flex e-con-boxed e-con e-parent\" data-id=\"1fc008e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fb73d92 e-grid e-con-full e-con e-child\" data-id=\"fb73d92\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c4454 elementor-widget elementor-widget-text-editor\" data-id=\"c1c4454\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In a previous LinkedIn post about vibe coding gone horribly wrong, I talked about the dangers of just going with the &#8220;vibes&#8221; and why we should still care about the resulting code. This blog post will focus on a different topic, secure coding when using an AI assistant tool or an application development platform that uses AI generated code behind the scenes. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e95ee12 elementor-widget elementor-widget-image\" data-id=\"e95ee12\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"448\" data-src=\"https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/AI-and-secure-coding-Not-always-best-friends-1-1024x573.jpg.webp\" class=\"attachment-large size-large wp-image-7969 lazyload\" alt=\"\" data-srcset=\"https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/AI-and-secure-coding-Not-always-best-friends-1-1024x573.jpg.webp 1024w, https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/AI-and-secure-coding-Not-always-best-friends-1-300x168.jpg.webp 300w, https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/AI-and-secure-coding-Not-always-best-friends-1-768x430.jpg.webp 768w, https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/AI-and-secure-coding-Not-always-best-friends-1-1536x860.jpg.webp 1536w, https:\/\/deltasource.eu\/wp-content\/uploads\/2025\/09\/AI-and-secure-coding-Not-always-best-friends-1.jpg 1600w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/448;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a366ab3 e-con-full e-flex e-con e-child\" data-id=\"a366ab3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f33113b elementor-widget elementor-widget-text-editor\" data-id=\"f33113b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Secure coding and AI, they are not always best friends. Let&#8217;s start by explaining a perhaps lesser-known cyberattack called a &#8221; <\/span><b>supply chain attack<\/b><span style=\"font-weight: 400;\">&#8221; attack and how it relates to AI-generated code. It&#8217;s a hacker&#8217;s wet dream to infiltrate the original source code or libraries used by software applications around the world. The hacker&#8217;s mission is to plant some malicious code that can steal data and passwords. The software application is built with the malicious code inside and then shipped by a trusted software distributor. Most likely, this malicious code will remain undetected for a long time, giving the hacker plenty of time to steal your trusted data.    <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b122eb elementor-widget elementor-widget-text-editor\" data-id=\"6b122eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This &#8220;supply chain attack&#8221; is not new and it requires a lot of skills and time to prepare, but when it succeeds, it&#8217;s probably the most powerful cyber attack. Imagine what could happen if a web server or a popular online meeting application used around the world is compromised at its source. In May 2001, the open-source Apache web server, which at the time hosted over 60% of the world&#8217;s web sites, nearly fell   <\/span><a href=\"https:\/\/www.apache.org\/info\/20010519-hack.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">victim to a supply chain attack<\/span><\/a><span style=\"font-weight: 400;\">. A public server hosting the source code repositories and binary releases of the Apache web server was compromised. Fortunately, this vulnerability was discovered by the open source community in time to prevent the hackers from injecting malicious code. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a46685 elementor-widget elementor-widget-text-editor\" data-id=\"3a46685\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A more recent example of a supply chain attack happened just a week ago on September 8. About  <\/span><a href=\"https:\/\/thehackernews.com\/2025\/09\/20-popular-npm-packages-with-2-billion.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">20 npm packages were compromised<\/span><\/a><span style=\"font-weight: 400;\"> that in total are downloaded <\/span><b>2 billion times a week<\/b><span style=\"font-weight: 400;\"> The compromised npm packages were distributed on the trusted npm registry but contained malicious code that would intercept your username and password to steal your crypto currency wallet. The malicious code was obfuscated as well to stay hidden as long as possible. The hacker was able to infiltrate by getting control of a Github account of a trusted open source contributor. It all started with a phishing email to enable MFA (Multi Factor Authentication) that appeared to be legit but was sent from a malicious domain name nmpjs.help that was registered just a couple days before on September 5.    <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0403734 elementor-widget elementor-widget-text-editor\" data-id=\"0403734\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>With more and more code generated by an AI agent or a vibe coding platform, is AI generated code still vulnerable to these supply chain attacks?<\/strong><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-651712b elementor-widget elementor-widget-text-editor\" data-id=\"651712b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The answer is simply yes. While AI agents are getting better at generating syntactically correct code samples, they are still very bad at generating secure code. A recent   <\/span><a href=\"https:\/\/www.veracode.com\/resources\/analyst-reports\/2025-genai-code-security-report\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">GenAI security report<\/span><\/a><span style=\"font-weight: 400;\"> shows AI getting almost exponentially better over the years at generating syntactically correct code that actually compiles. However, the graph also shows a flat line for AI code violations against the OWASP Top 10 Security Threats.  <\/span><a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">OWASP Top 10 Security Threats<\/span><\/a><span style=\"font-weight: 400;\"> (see red line in the chart). The OWASP Top 10, such as code injection, are easily detected by static code analysis tools such as the SonarQube OWASP plugin. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3aa1c elementor-widget elementor-widget-image\" data-id=\"2f3aa1c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"612\" height=\"409\" data-src=\"https:\/\/deltasource.eu\/wp-content\/uploads\/2025\/09\/2025-GenAI-Code-Security-Report-chart.webp\" class=\"attachment-large size-large wp-image-7959 lazyload\" alt=\"2025 GenAI Code Security Report\" data-srcset=\"https:\/\/deltasource.eu\/wp-content\/uploads\/2025\/09\/2025-GenAI-Code-Security-Report-chart.webp 612w, https:\/\/deltasource.eu\/wp-content\/uploads\/2025\/09\/2025-GenAI-Code-Security-Report-chart-300x200.webp 300w\" data-sizes=\"(max-width: 612px) 100vw, 612px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 612px; --smush-placeholder-aspect-ratio: 612\/409;\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">2025 GenAI Code Security Report - Veracode<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ed256b elementor-widget elementor-widget-text-editor\" data-id=\"3ed256b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>You may be wondering why an AI agent does not generate secure code from the start?<\/strong><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed4b4b6 elementor-widget elementor-widget-text-editor\" data-id=\"ed4b4b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">You need to remember that an AI agent is an inferrer, it&#8217;s not something deterministic like a code compiler. This means that an AI agent will choose the most likely next part (or token, if you like) to generate for the programming code. One of the reasons why an agent does not always write secure code is that an AI agent is trained on many public code samples that are freely available in technical articles on the Internet.  <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7623b14 elementor-widget elementor-widget-text-editor\" data-id=\"7623b14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">These code samples are often used to demonstrate a particular coding technique or programming concept, and are often for demonstration purposes only. They provide some tutorials on how to get started quickly, using less secure things like shared access keys and not implementing fine-grained authorization control. These articles don&#8217;t pay attention to secure coding techniques because they want to explain a particular concept. Things like    <\/span><b>security by design<\/b><span style=\"font-weight: 400;\"> and <\/span><b>zero trust architecture<\/b><span style=\"font-weight: 400;\"> (&#8220;never trust, always verify&#8221;) are left out to focus on the concept at hand.<br><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c451b07 elementor-widget elementor-widget-text-editor\" data-id=\"c451b07\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Still on the same topic of a supply chain attack. As we all know, an AI agent can suffer from hallucinations, often giving very convincing answers that are simply not correct. There&#8217;s a new term called &#8220;package hallucinations&#8221; for AI-generated code. AI-generated code refers to software packages that should be used, but simply don&#8217;t exist in the real world.   <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc9ec34 elementor-widget elementor-widget-text-editor\" data-id=\"bc9ec34\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The large-scale research published in the academic paper &#8220;<\/span><a href=\"https:\/\/arxiv.org\/pdf\/2406.10279\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs <\/span><\/a><span style=\"font-weight: 400;\">&#8221; tested 576,000 AI-generated code samples. Nearly 20% of them contained links to source code libraries that simply don&#8217;t exist. The results varied a bit depending on the programming language used to generate the code. Across different LLMs, the same non-existent code libraries came back in the generated code. As a hacker, you could detect this pattern and publish the software packages that the AI agent said to use.    <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dee268 elementor-widget elementor-widget-image\" data-id=\"4dee268\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"221\" data-src=\"https:\/\/deltasource.eu\/wp-content\/uploads\/2025\/09\/OWASP-top-10.jpg\" class=\"attachment-large size-large wp-image-7961 lazyload\" alt=\"\" data-srcset=\"https:\/\/deltasource.eu\/wp-content\/uploads\/2025\/09\/OWASP-top-10.jpg 936w, https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/OWASP-top-10-300x83.jpg.webp 300w, https:\/\/deltasource.eu\/wp-content\/smush-webp\/2025\/09\/OWASP-top-10-768x212.jpg.webp 768w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/221;\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">OWASP Top 10 Web Application Security Risks<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e22546 elementor-widget elementor-widget-text-editor\" data-id=\"6e22546\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The difference is that the hallucinated software packages now exist in the real world to which the AI agent is referring. This supply chain attack technique is also known as  <\/span><a href=\"https:\/\/socket.dev\/blog\/slopsquatting-how-ai-hallucinations-are-fueling-a-new-class-of-supply-chain-attacks\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">slopsquatting<\/span><\/a><span style=\"font-weight: 400;\">. Hackers register the recommended &#8220;hallucinated packages&#8221; on trusted distribution platforms. These software packages contain some malicious code to poison your software application at the source. The problem is that you trusted the generated code too much, but you didn&#8217;t verify that the suggested code libraries you were about to download were trustworthy.  <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20cbcce elementor-widget elementor-widget-text-editor\" data-id=\"20cbcce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Speaking of vibe coding, the vibe coding platform Lovable also had its share of <\/span><a href=\"https:\/\/www.semafor.com\/article\/05\/29\/2025\/the-hottest-new-vibe-coding-startup-lovable-is-a-sitting-duck-for-hackers\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">security issues<\/span><\/a><span style=\"font-weight: 400;\"> with AI-generated code. About 10% of the deployed web applications scanned for security issues were exposed to hackers accessing data such as personal and financial information.API keys of cloud providers are publicly available. Cloud platform API keys are particularly attractive to hackers because they allow them to run their phishing sites and other malicious applications on a cloud platform for free. Again, it&#8217;s a good reminder to always set a budget limit on your cloud provider account.    <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52a02c5 elementor-widget elementor-widget-text-editor\" data-id=\"52a02c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Many vibe coding users don&#8217;t have a technical background and often have little or no knowledge of secure coding. They trust the vibe coding platform to handle the security aspects of the deployed web application, but these platforms still have a long way to go. As Lovable said in a May 29th   <\/span><a href=\"https:\/\/x.com\/lovable_dev\/status\/1928176264445399440\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">post op X<\/span><\/a><span style=\"font-weight: 400;\">, <i>&#8220;We&#8217;re not where we want to be in terms of security, and we&#8217;re committed to continuing to improve the security posture for all Lovable users\u201d.<\/i><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca41437 elementor-widget elementor-widget-text-editor\" data-id=\"ca41437\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">I probably keep repeating myself, <strong>an AI agent can be a great tool for a software engineer<\/strong> but make sure you&#8217;re still in the <strong>driver&#8217;s seat<\/strong>. <strong>You should care about the code (not just the AI generated or not)<\/strong> and certainly don&#8217;t blindly follow the AI agent.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a0edea elementor-widget elementor-widget-text-editor\" data-id=\"3a0edea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">If you&#8217;re interested in learning more, check out these online articles on AI and secure coding.<\/span><\/p><ul><li><p><a href=\"https:\/\/www.apache.org\/info\/20010519-hack.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">Apache.Org compromise report, May 30th, 2001<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/www.scworld.com\/news\/sloppy-ai-defenses-take-cybersecurity-back-to-the-1990s-researchers-say\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">Black Hat: Sloppy AI defenses take cybersecurity back to the 1990s, researchers say<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/nerds.xyz\/2025\/07\/ai-security-flaws-veracode-2025\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">AI code generators are writing vulnerable software nearly half the time<\/span><\/a><span style=\"font-weight: 400;\"> by Brian Fagioli on <\/span><a href=\"http:\/\/nerds.xyz\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">nerds.xyz<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">OWASP top 10 web application security risks<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/www.aikido.dev\/blog\/npm-debug-and-chalk-packages-compromised\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">npm debug and chalk packages compromised<\/span><\/a><span style=\"font-weight: 400;\"> by Charlie Eriksen on <\/span><a href=\"https:\/\/www.aikido.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">aikido.dev<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/thehackernews.com\/2025\/09\/20-popular-npm-packages-with-2-billion.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack<\/span><\/a><span style=\"font-weight: 400;\"> by Ravie Lakshmanan on <\/span><a href=\"http:\/\/thehackernews.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">thehackernews.com<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/socket.dev\/blog\/slopsquatting-how-ai-hallucinations-are-fueling-a-new-class-of-supply-chain-attacks\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">The Rise of Slopsquatting: How AI Hallucinations Are Fueling a New Class of Supply Chain Attacks<\/span><\/a><span style=\"font-weight: 400;\"> by Sarah Gooding on <\/span><a href=\"https:\/\/socket.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">socket.dev<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/www.semafor.com\/article\/05\/29\/2025\/the-hottest-new-vibe-coding-startup-lovable-is-a-sitting-duck-for-hackers\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">The hottest new vibe coding startup may be a sitting duck for hackers<\/span><\/a><span style=\"font-weight: 400;\"> by Reed Albergotti on <\/span><a href=\"http:\/\/semafor.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">semafor.com<\/span><\/a><\/p><\/li><li><p><a href=\"https:\/\/arxiv.org\/pdf\/2406.10279\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">We Have a Package for You! A Comprehensive Analysis of Package Hallucinations  <\/span><\/a><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\" href=\"https:\/\/arxiv.org\/pdf\/2406.10279\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span>by Code Generating LLMs<\/span><\/a><span style=\"font-weight: 400;\"> academic article by different authors<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This blog post discusses the risks of secure coding combined with AI-generated code and links to supply chain attacks. These attacks, in which hackers inject malicious code into trusted software packages or libraries, can have huge impact and are difficult to detect. Recent incidents, such as compromised npm packages, show how vulnerable the software chain is. With the rise of AI-generated code comes a new risk: AI tools can not only adopt unsafe patterns from public examples, but also produce so-called &#8220;package hallucinations&#8221; &#8211; references to non-existent libraries that hackers can then register and abuse. This opens the door for a new variant of supply chain attacks, slopsquatting.    <\/p>\n","protected":false},"author":7,"featured_media":7950,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/posts\/7974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/comments?post=7974"}],"version-history":[{"count":0,"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/posts\/7974\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/media\/7950"}],"wp:attachment":[{"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/media?parent=7974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/categories?post=7974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deltasource.eu\/en\/wp-json\/wp\/v2\/tags?post=7974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}