State of Vibe-Coded Security 2026
We analyzed 100+ apps built with Lovable, Bolt, Cursor, Claude, and v0. The findings are consistent across every independent audit: AI tools build fast, and the security defaults are not enough.
of AI-built apps have High or Critical vulnerabilities
Across 40+ apps audited independently by PreBreach (2025–2026). Consistent with findings from VibeWrench (100 apps, avg grade D) and Lorikeet Security.
expose API keys in client-side JavaScript
have missing or misconfigured Supabase RLS
of fully audited apps had exploitable flaws
Methodology
This report synthesizes findings from published third-party audits, CVE disclosures, and community-reported incidents. The data comes from:
- —PreBreach — 40+ AI-built apps audited with OWASP Top 10 methodology (2025–2026)
- —VibeWrench — 100 apps scanned, 318 vulnerabilities found, average security grade D
- —ShipSafe — Cursor-specific analysis: 67% of audited apps had critical vulnerabilities (March 2026)
- —Lorikeet Security + Sherlock Forensics — independent full audits confirming 100% exploitable flaw rate
- —CVE database — CVE-2025-48757, CVE-2025-54136, CVE-2025-55182, CVE-2025-59536 and related disclosures
- —Published incident reports: Moltbook, Enrichlead, Base44, OpenClaw plugin attack
What we did not do: exploit live apps, access private user data, or conduct unauthorized testing. All findings are from published sources and opt-in audits. This is a fast first-pass review — not a penetration test — and cannot prove any specific app is fully secure.
Six findings across every audit
These patterns appear consistently across Lovable, Bolt, Cursor, and Claude-generated code.
Exposed secrets in client-side code
CRITICALAPI keys, database connection strings, Stripe secrets, and third-party tokens embedded directly in JavaScript bundles served to every visitor. AI tools generate working code — the fastest path is often to put credentials inline.
Missing security headers
HIGHHSTS, CSP, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy are absent on the majority of AI-built apps. These headers are not set by AI tools by default — they require explicit configuration. Without them, browsers cannot enforce the protections they are designed to provide.
Supabase RLS misconfiguration
CRITICALRow Level Security is enabled — but the policies say USING (true), which grants every row to every user regardless of who they are. AI tools generate syntactically correct RLS policies that are semantically open. Developers see "RLS enabled" and assume they are protected.
Auth gaps and inverted logic
HIGH31% of AI-generated apps have inverted authentication logic — a missing ! operator that blocks authenticated users while permitting anonymous ones. A separate 58% have no rate limiting on auth endpoints. Frontend-only role checks (the UI hides the admin panel but the API does not verify) affect 28%.
Exposed admin and debug endpoints
HIGHAdmin panels, debug routes, and internal API endpoints left publicly accessible. AI tools generate scaffolding quickly — routes intended for internal use often have no authentication guard applied because the developer did not specify one.
Vulnerable dependencies and supply chain
HIGHOutdated packages with known CVEs, malicious MCP server integrations, and plugin injection attacks. AI tools recommend and install packages based on training data — which may include deprecated or compromised packages. MCP integrations introduce a new attack surface that has no existing tooling.
Platform breakdown
The same vulnerability classes appear across every platform. The differences are in severity and public disclosure history.
| Platform | Top issue | CVEs | Risk |
|---|---|---|---|
| Lovable | RLS misconfiguration + BOLA170+ apps exposed in April 2026 incident | CVE-2025-48757 | High risk |
| Bolt | Missing security headersNo independent security analysis published yet | None filed publicly | Unanalyzed |
| Cursor | RCE via MCP + inverted auth67% of audited apps had critical vulnerabilities (ShipSafe) | CVE-2025-54136, CVE-2025-54135 | High risk |
| Claude / Claude Code | MCP RCE + auth endpoint gapsMCP file bypass and RCE disclosed Feb 2026 (Check Point) | CVE-2025-59536, CVE-2025-59944 | Medium risk |
| v0 / Vercel | React Server Component data leaksReact2Shell: source disclosure + DoS in Next.js 15–16 (Dec 2025) | CVE-2025-55182, CVE-2025-55184 | Medium risk |
Who is most at risk
Solo founders shipping to real users
Building fast is the point of AI tools — but the gap between 'it works' and 'it is secure' is widest when there is no second set of eyes on the code.
Apps that handle payments or auth
Stripe keys in client bundles, open RLS on a users table, and inverted auth on a subscription check. Any one of these is a critical incident.
Apps built by non-engineers
AI tools are explicitly marketed to non-technical builders. Security defaults that require developer configuration are invisible to this audience.
Apps deployed to production in under 48 hours
The faster the ship cycle, the fewer the checkpoints. The average vibe-coded app goes from idea to live URL in one session.
What to do before you launch
Run a URL scan on your deployed app
Check what your public surface actually exposes — headers, endpoints, bundle contents.
Audit every Supabase RLS policy
USING (true) is open to everyone. Every policy should scope to auth.uid() = user_id or equivalent.
Paste your lockfile and check CVEs
Your AI builder installed packages based on its training data. Some of those have known vulnerabilities now.
Check every route guard for inverted logic
If a condition gates by role or auth, read it twice. The missing ! is a common AI-generated mistake.
Verify security headers are set
HSTS, CSP, X-Frame-Options, X-Content-Type-Options. None are set by default in most AI-generated apps.
Move all credentials server-side
If a key is referenced in a client component or exported from a route, it is in the browser bundle.
Free audit
Get a free full report for your app
We’re running free audits with early users. Leave your email and we’ll send you the full paid-tier report — fix prompts included, no credit card needed.
No spam. Unsubscribe any time. Spots are limited.
Check your own app
Free scan in 30 seconds. Paste a URL, your AI builder output, or a lockfile. No GitHub access needed.
Free preview · Fix prompts and recheck from $9
Not a penetration test. Fast first-pass review of your public surface and the artifacts you provide.
Sources
- —PreBreach — OWASP Top 10 in AI-Generated Code (Feb 2026) · prebreach.dev
- —VibeWrench — 100 App Security Benchmark (2025–2026) · vibewrench.dev
- —ShipSafe — Cursor Security Risks: 67% Have Critical Vulnerabilities (Mar 2026) · ship-safe.co
- —Lorikeet Security + Sherlock Forensics — independent AI-app audit reports (2025–2026)
- —Lovable — Our Response to the April 2026 Incident (Apr 2026) · lovable.dev/blog
- —CVE-2025-48757 — Lovable BOLA: unauthorized project access
- —CVE-2025-54136 — Cursor RCE via malicious MCP file
- —CVE-2025-55182 — React2Shell: Next.js Server Component source disclosure
- —CVE-2025-59536, CVE-2025-59944 — Claude Code MCP RCE + file bypass (Check Point, Feb 2026)
- —Stanford / Perry et al. (2024) — Developers using AI assistance produce less secure code