AI-powered programming could heighten the likelihood of extensive security weaknesses.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Coding Powered by AI and Security Flaws

Quick Overview
- The advancement of AI could heighten the occurrence of insecure direct object references (IDORs).
- IDORs are linked to flawed access control measures within web applications.
- Recent occurrences of IDORs involve data breaches at McDonald’s McHire and Optus.
- Developers, under tight deadlines and AI dependency, may worsen these vulnerabilities.
- AI’s lack of business context comprehension can result in overlooking security issues.
- Backslash’s Vibe Coding Security Threat Model is designed to address AI-related security hazards.
Grasping Insecure Direct Object References (IDORs)
IDORs represent a class of vulnerabilities in web applications that emerge from inadequate access controls. They permit unauthorized access to confidential information with little effort and no specialized knowledge required. A prominent case is McDonald’s AI McHire tool, where researchers retrieved applicant information due to poorly configured access permissions and a default password.
Noteworthy IDOR Incidents
The Optus data breach in 2022 and Atlassian’s Confluence Server issue are significant IDOR occurrences. Both cases involved unsecured API endpoints, enabling hackers to access private customer data. These events illustrate the substantial repercussions IDORs can inflict, often leading to extensive data leaks.
Challenges for Developers and the Influence of AI
Developers confront pressures that may lead to insufficient access controls. AI-supported development, or “vibe coding,” can intensify this challenge as it may not adequately grasp the business context of the system. If AI recommendations are taken at face value, they can amplify human errors.
Addressing AI-Linked Security Hazards
To combat such vulnerabilities, Backslash has launched the Vibe Coding Security Threat Model. This resource assists developers in recognizing and mitigating the challenges posed by AI-powered development.
Conclusion
The surge of AI in software creation presents a potential risk of augmenting IDOR vulnerabilities due to deficient access controls. Highly publicized breaches like those at McDonald’s and Optus emphasize the gravity of these problems. Developers must stay alert against productivity-related pressures and limitations of AI to maintain strong security measures.