AI-Generated Code Accelerates Cybersecurity Risks as Firms Ship Vulnerable Software

Thumbnail Image

The information displayed in the AIM should not be reported as representing the official views of the OECD or of its member countries.

Research by Checkmarx reveals that 75% of organizations knowingly deploy vulnerable code, a risk exacerbated by AI-generated applications. AI tools have drastically reduced the time for threat actors to exploit vulnerabilities—from 840 days in 2018 to less than two days in 2026—leading to increased data breaches and cyberattacks.[AI generated]

Why's our monitor labelling this an incident or hazard?

The article explicitly mentions AI tools generating code that is shipped with known vulnerabilities, leading to exposure of sensitive data and increased cybersecurity risks. The AI system's use (code generation) is directly linked to the harm (data exposure and security flaws). The harm is realized, not just potential, as thousands of vulnerable apps are already live. This fits the definition of an AI Incident because the AI system's use has directly led to harm to property and communities through data breaches and increased cyberattack risks.[AI generated]
AI principles
Robustness & digital securityPrivacy & data governance

Industries
Digital securityIT infrastructure and hosting

Affected stakeholders
Business

Harm types
Economic/PropertyReputationalHuman or fundamental rights

Severity
AI incident

Business function:
Research and development

AI system task:
Content generation


Articles about this incident or hazard

Thumbnail Image

AI-generated code is outpacing every manual remediation model in existence': Nearly all firms admit they have shipped code they know is vulnerable

2026-05-22
TechRadar
Why's our monitor labelling this an incident or hazard?
The article explicitly mentions AI tools generating code that is shipped with known vulnerabilities, leading to exposure of sensitive data and increased cybersecurity risks. The AI system's use (code generation) is directly linked to the harm (data exposure and security flaws). The harm is realized, not just potential, as thousands of vulnerable apps are already live. This fits the definition of an AI Incident because the AI system's use has directly led to harm to property and communities through data breaches and increased cyberattack risks.
Thumbnail Image

75% of Companies Ship Vulnerable Code, Despite a Startling Increase in Threat Velocity; 'Agentic AppSec Unleashed '26" Is Changing That

2026-05-21
The Manila times
Why's our monitor labelling this an incident or hazard?
The article centers on a planned summit addressing AI-related application security challenges and the growing threat landscape due to AI-generated code vulnerabilities. It discusses the context of AI risks and the industry's response but does not describe a particular AI incident or hazard event causing or plausibly leading to harm. Therefore, it fits the definition of Complementary Information, as it provides supporting context and governance-related developments rather than reporting a new AI Incident or AI Hazard.
Thumbnail Image

Three-Quarters of Firms Knowingly Ship Vulnerable Code, Says Checkmarx

2026-05-21
Infosecurity Magazine
Why's our monitor labelling this an incident or hazard?
The article explicitly mentions AI-generated code and AI-assisted threat actors as key factors increasing the speed and scale of vulnerability exploitation. The shipping of vulnerable code and the adversarial use of AI have directly contributed to realized harms such as data breaches and cyber events, which constitute harm to property and communities. Therefore, this qualifies as an AI Incident because the development and use of AI systems have directly led to significant harm through cybersecurity breaches and supply chain attacks.
Thumbnail Image

75% of Companies Ship Vulnerable Code, Despite a Startling Increase in Threat Velocity; ...

2026-05-21
Eagle-Tribune
Why's our monitor labelling this an incident or hazard?
While AI is mentioned in the context of application security and innovation, the article does not report a specific AI system malfunction, misuse, or development that has directly or indirectly caused harm, nor does it describe a plausible future harm event directly linked to AI systems. The information is about general security risks and industry trends, serving as contextual background and a call to action rather than reporting an AI Incident or AI Hazard. Therefore, it fits best as Complementary Information, providing context on AI-related security challenges without detailing a specific incident or hazard.
Thumbnail Image

Organizations knowingly ship vulnerable code amid shrinking exploit windows

2026-05-22
SC Media
Why's our monitor labelling this an incident or hazard?
The article explicitly mentions AI-generated applications and AI tools that drastically reduce the time to exploit vulnerabilities, which is a clear involvement of AI systems in the development and use phases. Although no specific harm has been reported as having occurred, the described scenario plausibly leads to AI incidents such as harm to health (healthcare sector risks), harm to property or communities (data exposure), and disruption of critical infrastructure. Therefore, this qualifies as an AI Hazard because it outlines a credible and significant risk of future harm stemming from AI-related vulnerabilities and practices.