In early 2024, a placing deepfake fraud case in Hong Kong introduced the vulnerabilities of AI-driven deception into sharp aid. A finance worker was duped throughout a video name by what seemed to be the CFO—however was, actually, a complicated AI-generated deepfake. Satisfied of the decision’s authenticity, the worker made 15 transfers totaling over $25 million to fraudulent financial institution accounts earlier than realizing it was a rip-off.
This incident exemplifies extra than simply technological trickery—it alerts how belief in what we see and listen to will be weaponized, particularly as AI turns into extra deeply built-in into enterprise instruments and workflows. From embedded LLMs in enterprise methods to autonomous brokers diagnosing and even repairing points in reside environments, AI is transitioning from novelty to necessity. But because it evolves, so too do the gaps in our conventional safety frameworks—designed for static, human-written code—revealing simply how unprepared we’re for methods that generate, adapt, and behave in unpredictable methods.
Past the CVE Mindset
Conventional safe coding practices revolve round identified vulnerabilities and patch cycles. AI adjustments the equation. A line of code will be generated on the fly by a mannequin, formed by manipulated prompts or information—creating new, unpredictable classes of threat like immediate injection or emergent conduct exterior conventional taxonomies.
A 2025 Veracode examine discovered that 45% of all AI-generated code contained vulnerabilities, with frequent flaws like weak defenses in opposition to XSS and log injection. (Some languages carried out extra poorly than others. Over 70% of AI-generated Java code had a safety problem, as an illustration.) One other 2025 examine confirmed that repeated refinement could make issues worse: After simply 5 iterations, vital vulnerabilities rose by 37.6%.
To maintain tempo, frameworks just like the OWASP High 10 for LLMs have emerged, cataloging AI-specific dangers comparable to information leakage, mannequin denial of service, and immediate injection. They spotlight how present safety taxonomies fall quick—and why we’d like new approaches that mannequin AI menace surfaces, share incidents, and iteratively refine threat frameworks to replicate how code is created and influenced by AI.
Simpler for Adversaries
Maybe essentially the most alarming shift is how AI lowers the barrier to malicious exercise. What as soon as required deep technical experience can now be completed by anybody with a intelligent immediate: producing scripts, launching phishing campaigns, or manipulating fashions. AI doesn’t simply broaden the assault floor; it makes it simpler and cheaper for attackers to succeed with out ever writing code.
In 2025, researchers unveiled PromptLocker, the primary AI-powered ransomware. Although solely a proof of idea, it confirmed how theft and encryption could possibly be automated with an area LLM at remarkably low value: about $0.70 per full assault utilizing business APIs—and basically free with open supply fashions. That type of affordability may make ransomware cheaper, quicker, and extra scalable than ever.
This democratization of offense means defenders should put together for assaults which are extra frequent, extra assorted, and extra inventive. The Adversarial ML Menace Matrix, based by Ram Shankar Siva Kumar throughout his time at Microsoft, helps by enumerating threats to machine studying and providing a structured approach to anticipate these evolving dangers. (He’ll be discussing the problem of securing AI methods from adversaries at O’Reilly’s upcoming Safety Superstream.)
Silos and Talent Gaps
Builders, information scientists, and safety groups nonetheless work in silos, every with completely different incentives. Enterprise leaders push for speedy AI adoption to remain aggressive, whereas safety leaders warn that shifting too quick dangers catastrophic flaws within the code itself.
These tensions are amplified by a widening expertise hole: Most builders lack coaching in AI safety, and plenty of safety professionals don’t absolutely perceive how LLMs work. Consequently, the previous patchwork fixes really feel more and more insufficient when the fashions are writing and operating code on their very own.
The rise of “vibe coding”—counting on LLM recommendations with out evaluation—captures this shift. It accelerates improvement however introduces hidden vulnerabilities, leaving each builders and defenders struggling to handle novel dangers.
From Avoidance to Resilience
AI adoption gained’t cease. The problem is shifting from avoidance to resilience. Frameworks like Databricks’ AI Threat Framework (DASF) and the NIST AI Threat Administration Framework present sensible steering on embedding governance and safety straight into AI pipelines, serving to organizations transfer past advert hoc defenses towards systematic resilience. The aim isn’t to remove threat however to allow innovation whereas sustaining belief within the code AI helps produce.
Transparency and Accountability
Analysis exhibits AI-generated code is usually easier and extra repetitive, but in addition extra susceptible, with dangers like hardcoded credentials and path traversal exploits. With out observability instruments comparable to immediate logs, provenance monitoring, and audit trails, builders can’t guarantee reliability or accountability. In different phrases, AI-generated code is extra prone to introduce high-risk safety vulnerabilities.
AI’s opacity compounds the issue: A operate might seem to “work” but conceal vulnerabilities which are tough to hint or clarify. With out explainability and safeguards, autonomy shortly turns into a recipe for insecure methods. Instruments like MITRE ATLAS might help by mapping adversarial techniques in opposition to AI fashions, providing defenders a structured approach to anticipate and counter threats.
Wanting Forward
Securing code within the age of AI requires greater than patching—it means breaking silos, closing talent gaps, and embedding resilience into each stage of improvement. The dangers might really feel acquainted, however AI scales them dramatically. Frameworks like Databricks’ AI Threat Framework (DASF) and the NIST AI Threat Administration Framework present constructions for governance and transparency, whereas MITRE ATLAS maps adversarial techniques and real-world assault case research, giving defenders a structured approach to anticipate and mitigate threats to AI methods.
The alternatives we make now will decide whether or not AI turns into a trusted companion—or a shortcut that leaves us uncovered.

