Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

GitHub Code Flaw Replicated By AI Models

June 2, 2025
Reading Time: 2 mins read
in Alerts
Linux Core Dump Flaws Risk Password Leaks

A comprehensive research study has identified a widespread code flaw. This is a path traversal vulnerability, also known as CWE-22. It currently affects 1,756 open-source GitHub projects. Some of these projects are highly influential in software. The vulnerability exists in a common Node.js code pattern. This pattern is used for creating static HTTP file servers. Attackers can exploit this to access restricted files. This potentially compromises system confidentiality and availability. Many affected projects have critical vulnerabilities. Their CVSS scores are often higher than 9.0. They can be exploited remotely without any privileges.

The vulnerable code pattern first emerged around 2010.

It has since propagated through popular developer resources. These resources include GitHub Gist and Stack Overflow posts. Educational materials also contributed to its spread. Despite developers sometimes raising security concerns, it spread. The vulnerability continued its propagation widely. This was due to misconceptions about its actual safety. Many developers incorrectly assumed the code was secure. They tested it with standard HTTP clients like browsers. These clients normalize URLs by default, masking the flaw. Developers frequently reuse code from various sources.

This replication effect significantly increases the overall risk.

To conduct this large-scale study, researchers developed a tool. They used an automated pipeline for their work. This pipeline scanned GitHub for the vulnerable pattern. It confirmed exploitability through static and dynamic testing. The impact was then assessed by calculating CVSS scores. Patches were subsequently generated using GPT-4 technology. Vulnerabilities were then responsibly reported to project maintainers. Through these disclosure efforts, some flaws were fixed. So far, 14% of reported vulnerabilities have been remediated. A staged notification approach was carefully used. Popular projects had a higher remediation rate than others. Less prominent repositories showed lower fix rates.

Perhaps most concerning is a discovery about LLMs. The widespread vulnerable code pattern has “poisoned” them. When prompted, 95% of code from tested LLMs was flawed. This happened when creating static file servers. Even when asked for “secure” servers, issues persisted. Seventy percent of the generated code remained vulnerable. This demonstrates how models propagate flaws from training data. Researchers highlight an urgent need to secure open source. Scalable automated vulnerability management solutions are needed. Developer awareness must also be greatly increased. These findings underscore significant cascading security risks. Vulnerable patterns spread easily through communities. They now enter AI code generation tools.

Reference:

  • GitHub Path Traversal Flaw In 1700 Projects Now Replicated By AI Language Models
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

Glassworm Malware Strikes Again In VS Code

Shadypanda Extensions Hit Millions Users

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Smarttube Breach Pushes Malicious Update

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Glassworm Malware Strikes Again In VS Code

December 2, 2025
Albiriox Malware Hits Hundreds Of Apps

Google Meet Page Used To Deliver Malware

December 1, 2025
Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025

Latest Alerts

Shadypanda Extensions Hit Millions Users

Smarttube Breach Pushes Malicious Update

Glassworm Malware Strikes Again In VS Code

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Subscribe to our newsletter

    Latest Incidents

    French Soccer Federation Suffers Cyberattack

    120,000 Cameras Hacked In South Korea

    Hackers Claim Mercedes Benz USA Breach

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial