Saturday, 9 May 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > 5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis
Tech and Science

5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis

Last updated: May 9, 2026 4:40 pm
Share
5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis
SHARE

Traditional enterprise security strategies were designed to safeguard servers, endpoints, and cloud accounts. However, they are not equipped to detect a customer intake form that a product manager created using vibe coding on Lovable over the weekend, linked to a live Supabase database, and launched on a public URL that Google indexed. This oversight now has tangible consequences.

New insights from the Israeli cybersecurity firm RedAccess shed light on the extent of the issue. Their research uncovered 380,000 publicly accessible assets, such as applications, databases, and infrastructure, developed with vibe coding tools from Lovable, Base44, and Replit, as well as the deployment platform Netlify. Approximately 5,000 of these assets, representing 1.3%, contained sensitive corporate data. CEO Dor Zvi revealed that his team discovered this vulnerability while investigating shadow AI for clients. Axios independently confirmed several exposed apps, and Wired corroborated the findings through separate verification.

The confirmed exposures include an app from a shipping company that outlined which vessels were scheduled to arrive at specific ports, a health company application listing active clinical trials in the U.K., and unredacted customer service interactions for a British cabinet supplier available on the web. Additionally, internal financial details for a Brazilian bank were accessible to anyone with the URL.

The compromised data also covered patient communications at a children’s long-term care facility, doctor-patient summaries in hospitals, incident response records at a security company, and advertising purchasing strategies. Depending on the jurisdiction and the nature of the data, these healthcare and financial exposures may lead to regulatory requirements under HIPAA, UK GDPR, or Brazil’s LGPD.

RedAccess also identified phishing sites built on Lovable that mimicked Bank of America, FedEx, Trader Joe’s, and McDonald’s. Lovable has initiated investigations and is working to remove these phishing sites.

The defaults are the problem

Privacy settings on several vibe coding platforms allow apps to be publicly accessible unless users manually change them to private. Many of these apps get indexed by Google and other search engines, making them easily discoverable. Zvi remarked: “I don’t think it’s feasible to educate the whole world around security. My mother is [vibe coding] with Lovable, and no offense, but I don’t think she will think about role-based access.”

This is not an isolated finding

In October 2025, Escape.tech examined 5,600 publicly available vibe-coded applications and found over 2,000 significant vulnerabilities, more than 400 exposed secrets like API keys and access tokens, and 175 instances of personal data exposure involving medical records and bank account numbers. All vulnerabilities identified by Escape were found in live production systems and were discoverable within hours. The detailed report outlines their methodology. Escape also secured an $18 million Series A funding round led by Balderton in March 2026, emphasizing the security gap created by AI-generated code as a central market thesis.

See also  South Korea holds election months after martial law crisis : NPR

Gartner’s “Predicts 2026” report projects that by 2028, prompt-to-app approaches adopted by citizen developers will boost software defects by 2,500%. Gartner highlights a new defect class where AI generates code that is syntactically correct but lacks comprehension of the broader system architecture and intricate business rules. The costs to address these deep contextual bugs will consume resources previously designated for innovation.

Shadow AI is the multiplier

IBM’s 2025 Cost of a Data Breach Report revealed that 20% of organizations encountered breaches linked to shadow AI, adding $670,000 to the average breach cost and increasing the shadow AI breach average to $4.63 million. Of the organizations that reported AI-related breaches, 97% lacked proper access controls, and 63% had no AI governance policy.

Shadow AI breaches predominantly exposed customer personally identifiable information at 65%, compared to 53% across all breaches, and affected data spread across multiple environments 62% of the time. Only 34% of organizations with AI governance policies conducted regular audits for unsanctioned AI tools. VentureBeat’s shadow AI research predicted that active shadow apps could more than double by mid-2026. Cyberhaven data indicated that 73.8% of ChatGPT workplace accounts in enterprise settings were unauthorized.

What to do first

The audit framework below provides CISOs with a roadmap for assessing vibe-coded app risks across five domains.

Domain

Current State (Most Orgs)

Target State

First Action

Discovery

No visibility into vibe-coded apps

Automated scanning of vibe coding platform domains

Run DNS + certificate transparency scan for Lovable, Replit, Base44, and Netlify subdomains tied to corporate assets

Authentication

Platform defaults (public by default)

SSO/SAML integration required before deployment

Block unauthenticated apps from accessing internal data sources

Code scanning

Zero coverage for citizen-built apps

Mandatory SAST/DAST before production

Extend the existing AppSec pipeline to cover vibe-coded deployments

Data loss prevention

No DLP coverage for vibe coding domains

DLP policies covering Lovable, Replit, Base44, Netlify

Add vibe coding platform domains to existing DLP rules

Governance

No AI usage policy or shadow AI detection

AI governance policy with regular audits for unsanctioned tools

Publish an acceptable-use policy for AI coding tools with a pre-deployment review gate

See also  Our big brains may have evolved because of placental sex hormones

The CISO who views this as a policy issue might draft a memo. The CISO who sees it as an architectural challenge will launch discovery scans across the four major vibe coding domains, enforce pre-deployment security reviews, extend the AppSec pipeline to include citizen-built apps, and incorporate these domains into DLP rules before the next board meeting. One of these CISOs will steer clear of future headlines.

The vibe coding exposure that RedAccess documented is intricately linked to shadow AI. It represents shadow AI’s production layer, where employees create internal tools on platforms that default to public, bypass authentication, and remain absent from asset inventories. Consequently, these applications remain invisible to security teams until a breach occurs or a reporter uncovers them. Conventional asset discovery tools are designed to identify servers, containers, and cloud instances, not a marketing configurator a product manager crafted on Lovable over a weekend, connected to a Supabase database containing live customer records, and shared via a public URL that Google quickly indexed.

The detection challenge runs deeper than most security teams realize. Vibe-coded apps deploy on platform subdomains that rotate frequently and often sit behind CDN layers that mask origin infrastructure. Organizations running mature, secure web gateways, CASB, or DNS logging can detect employee access to these domains. But detecting access is not the same as inventorying what was deployed, what data it holds, or whether it requires authentication. Without explicit monitoring of the major vibe coding platforms, the apps themselves generate a limited signal in conventional SIEM or endpoint telemetry. They exist in a gap between network visibility and application inventory that most security stacks were never architected to cover.

The platform responses tell the story

Replit CEO Amjad Masad reported that RedAccess informed his company only 24 hours before going public with the findings. Base44 (via Wix) and Lovable stated that RedAccess did not provide the URLs or technical specifics required to verify the findings. None of the platforms denied the existence of the exposed applications.

Wiz Research independently discovered in July 2025 that Base44 had a platform-wide authentication bypass. Exposed API endpoints allowed anyone to create a verified account on private apps using nothing more than a publicly visible app_id. The flaw meant that showing up to a locked building and shouting a room number was enough to get the doors open. Wix fixed the vulnerability within 24 hours after Wiz reported it, but the incident exposed how thin the authentication layer is on platforms where millions of apps are being built by users who assume the platform handles security for them.

See also  Our bodies are ageing faster than ever. Can we hit the brakes?

The pattern is consistent across the vibe coding ecosystem. CVE-2025-48757 documented insufficient or missing Row-Level Security policies in Lovable-generated Supabase projects. Certain queries skipped access checks entirely, exposing data across more than 170 production applications. The AI generated the database layer. It did not generate the security policies that should have restricted who could read the data. Lovable disputes the CVE classification, stating that individual customers accept responsibility for protecting their application data. That dispute itself illustrates the core tension: platforms that market to nontechnical builders are shifting security responsibility to users who do not know it exists.

What this means for security teams

The RedAccess findings complete the picture. Professional agents face credential theft on one layer, while citizen platforms encounter data exposure on another. The structural failure is consistent: security reviews occur post-deployment or not at all. Identity and access management systems monitor human users and service accounts but overlook the Lovable app a sales operations analyst deployed last Tuesday, linked to a live CRM database, and shared via a public URL with three external contractors.

Crucial questions often go unasked at AI-generation speed, such as whether database policies limit data access or if API endpoints require authentication. This oversight leads to exposure scaling faster than any human review process can manage. For security leaders, the pressing concern is not whether vibe-coded apps are present within their perimeter, but how many there are, what data they hold, and who can access them. The RedAccess findings suggest that for most organizations, the situation is more severe than anyone in the C-suite currently realizes. The organizations that initiate scanning this week will identify these vulnerabilities. Those that delay will likely see themselves in future news headlines.

TAGGED:appsbucketcrisisprovedShadowvibecoded
Share This Article
Twitter Email Copy Link Print
Previous Article Best Dewy Foundation For Oily Skin That Won’t Look Greasy Best Dewy Foundation For Oily Skin That Won’t Look Greasy
Next Article Iran Warns The U.S. Against Attacks On Its Oil Tankers And Other Ships But Ceasefire Appears To Hold Iran Warns The U.S. Against Attacks On Its Oil Tankers And Other Ships But Ceasefire Appears To Hold

Popular Posts

Security's AI dilemma: Moving faster while risking more

AI is transforming the landscape of security operations, presenting both opportunities and challenges for CISOs…

October 29, 2025

Emily Simpson on Alexis, Shannon’s DUI, Background Checks

What was it like navigating the drama surrounding Shannon Beador this season? It was definitely…

October 31, 2024

Recycling Solutions: Nespresso Coffee Pods

Nespresso coffee pods have become a popular choice for brewing a quick and delicious cup…

September 12, 2024

Energy drinks could cause less dental damage with a simple addition

Fortifying Energy Drinks with Calcium May Reduce Damage to Teeth Energy drinks may perk you…

July 4, 2025

The Buzzy New York City Restaurant Openings to Know in Spring 2025

Spring has arrived in New York City, and with it comes a fresh crop of…

April 22, 2025

You Might Also Like

A vast dam across the Bering Strait could stop the AMOC collapsing
Tech and Science

A vast dam across the Bering Strait could stop the AMOC collapsing

May 9, 2026
Huawei Launches New Line of Wearables
Tech and Science

Huawei Launches New Line of Wearables

May 9, 2026
Android 17: These Phones Won’t Get the Update
Tech and Science

Android 17: These Phones Won’t Get the Update

May 9, 2026
What Are You Actually Swallowing When You Take Probiotics? : ScienceAlert
Tech and Science

What Are You Actually Swallowing When You Take Probiotics? : ScienceAlert

May 8, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?