Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Hackers Exploit Vercel’s AI Trust

April 20, 2026

AI Supply Chains Outpacing Healthcare Cyber Defenses

April 20, 2026

Global Leaders Call for Unified Cyber Defense as Port Threats Escalate

April 20, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Code with Confidence: Secure Your Vibe!
Uncategorized

Code with Confidence: Secure Your Vibe!

Staff WriterBy Staff WriterAugust 19, 2025No Comments6 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. Tool Utilization: AI tools like vibe coding are not inherently good or bad; their effectiveness depends on human oversight and security measures.

  2. Human-Centric Approach: Successful implementation of AI-assisted coding requires prioritizing human involvement to validate and verify code, thus preventing security vulnerabilities.

  3. Security at Inception: Organizations should adopt a "Secure at Inception" strategy, integrating AI with built-in security features to identify and mitigate vulnerabilities early in the development process.

  4. Ongoing Human Oversight: Despite advancements in AI code checkers, humans must continue to monitor and verify outputs to ensure security, emphasizing a "trust but verify" approach.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘How to Vibe Code With Security in Mind’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

A tool can be used well or poorly, but much of the time it is neither inherently good nor bad.

Take vibe coding, the act of using natural language to instruct an LLM to generate code. Applied poorly, because models hallucinate and frequently introduce security vulnerabilities, they aren’t great at patching up on their own. But when humans are put at the center and code is verified and checked, the models can, in theory, be used to enhance production output (albeit not replace a person entirely).

If you’re at an organization and you just got a mandate from up high telling you that you need to implement AI-assisted development tools, one of your first questions might (hopefully) be: How can I do this securely?

There are many answers, but three of them come down to putting people at the center, emphasizing security from the beginning, and accounting for inherent unpredictability.

People First

Snyk chief technology officer (CTO) Danny Allan tells Dark Reading that in the past three months, “I have not talked to a customer that’s not using AI coding tools.”

“There is zero question in my mind that 100% of developers are going to be using AI-assisted coding tools,” he says. “It’s not a question of whether they’re going to use it or not. It’s more a question of how they use it.”

Related:AI Agents Access Everything, Fall to Zero-Click Exploit

While this is, of course, anecdotal, it’s clear that AI-assisted coding has quickly found a presence in many organizations. While the technology is still nascent and not capable of singlehandedly taking over application development, Allan says he’s seen some of the best use cases in prototyping and greenfield applications, where software is conceptualized for further development or refinement.

AI-generated code, as it exists now, generates significant software vulnerabilities when left unchecked. In Veracode’s “2025 GenAI Code Security Report,” researchers found that AI-generated code introduced notable vulnerabilities in 45% of tested tasks. A Georgetown University white paper published in November 2024, meanwhile, detailed how AI-generated code can introduce risks to the software supply chain.

While that doesn’t mean organizations are wrong to utilize AI-assisted coding tools, it does mean a human (or multiple humans) needs to be somewhere in that pipeline.

Wiz security researcher Hillai Ben-Sasson says that although vibe coding can be useful, it should be framed as a tool for humans to use. In other words, someone should be there to verify the code being generated.

“There has to be a human in the loop. If an application is fully vibe-coded by a person who can’t even look at the code, they can’t see where the code is secure or not, and then no one is there to take responsibility for it,” he says. “A model or vibe-coding platform can’t take responsibility for a security failure.”

Related:Workday Breach Likely Linked to ShinyHunters Salesforce Attacks

The World of AI Code Checkers

If an organization is going to apply vibe coding at any scale, Allan recommends what he describes as securing at inception, or attempting to ensure that code is developed with security in mind. “If you can use agents and guardrails within the AI, that is the path forward,” he says.

This month, Snyk announced a “Secure at Inception” capability in its platform that scans generated and executed code in real time for vulnerabilities. Its product joins a growing field of AI code remediation tools, such as Veracode’s Veracode Fix product and Legit Security’s AI remediation capabilities.

Chris Wysopal, founder and chief security evangelist at Veracode, tells Dark Reading that to appropriately implement something like vibe coding, you have to improve your entire security program.

In application security, organizations run into security debt, where an organization finds a vulnerability and doesn’t fix it, and as that happens more and more over time, the application becomes increasingly insecure. That problem gets even worse when the organization builds apps faster with fewer developers, so the problem needs to be addressed on the ground floor.

Related:Elevation-of-Privilege Vulns Dominate Microsoft’s Patch Tuesday

“The solution is either to train the models on secure code or to figure out how to align and tune them so that they put out more secure code,” he says. “What we think people need to do is use AI to fix the code.”

Similarly, at DEF CON 33, DARPA announced the winners of its two-year AI Cyber Challenge, a research contest to build tools intended to address open source software flaws using AI. All tools developed by the seven finalist teams will be open sourced.

Whether or not any of these checkers solve the emerging problem of AI code security, these tools are one of the key ways organizations are thinking about addressing it. Like security keys and phishing attacks, the idea in part is to offload some of the burden off of people.

And even with AI code checkers, that’s not to say humans are taken out of the equation entirely. Allan explains that in the spirit of “trust but verify,” code verification will be at least partially conducted by AI, but “humans will end up verifying the verification systems.”

Wypsol says that because AI generated code is insecure, even if it’s getting better in some ways over time, the predictable nature of AI code generating vulnerabilities should be accounted for in the build process, no matter what security solution you’re using.

“Build it into the process,” he explains. “It’s to say, ‘I know vibe coding is going to be generating these vulnerabilities.’ So right after it generates the code, test that code and remediate.”

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Discover More Technology Insights

Learn how the Internet of Things (IoT) is transforming everyday life.

Explore past and present digital transformations on the Internet Archive.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOne 23 Group Expands Power with ICS Acquisition
Next Article ActiveMQ Flaw Enabled to Deploy DripDropper Malware on Cloud Linux Systems
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Researchers Uncover ZionSiphon Malware Threatening Israeli Water Systems

April 20, 2026

$13.74M Hack Cripples Sanctioned Grinex Exchange After Suspicious Intelligence

April 18, 2026

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

April 15, 2026

Comments are closed.

Latest Posts

Hackers Exploit Vercel’s AI Trust

April 20, 2026

AI Supply Chains Outpacing Healthcare Cyber Defenses

April 20, 2026

Global Leaders Call for Unified Cyber Defense as Port Threats Escalate

April 20, 2026

Network ‘Background Noise’ Could Foretell Next Major Edge-Device Vulnerability

April 20, 2026
Don't Miss

Researchers Uncover ZionSiphon Malware Threatening Israeli Water Systems

By Staff WriterApril 20, 2026

Summary Points Researchers detected ZionSiphon, a sophisticated malware targeting Israeli water infrastructure, capable of persistence,…

$13.74M Hack Cripples Sanctioned Grinex Exchange After Suspicious Intelligence

April 18, 2026

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

April 15, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Hackers Exploit Vercel’s AI Trust
  • AI Supply Chains Outpacing Healthcare Cyber Defenses
  • Global Leaders Call for Unified Cyber Defense as Port Threats Escalate
  • Anthropic MCP flaw enables remote code execution threat
  • Cybercriminals exploit supply chain vulnerabilities with ransomware campaigns
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers Exploit Vercel’s AI Trust

April 20, 2026

AI Supply Chains Outpacing Healthcare Cyber Defenses

April 20, 2026

Global Leaders Call for Unified Cyber Defense as Port Threats Escalate

April 20, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202630 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Scams: Unstoppable but Manageable

June 3, 202523 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Most Read
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.