AI-Generated Passwords Are Fundamentally Weak and Vulnerable to Cracking Within Hours

Reviewed byNidhi Govil

2 Sources

Share

AI cybersecurity firm Irregular reveals that ChatGPT, Claude, and Gemini produce passwords with predictable patterns despite appearing strong. Research shows these AI-generated passwords have entropy as low as 20-27 bits compared to 98-120 bits for truly random passwords, making them crackable within hours even on decades-old computers. Experts urge immediate password changes for anyone using LLM password generation.

Large Language Models Create Deceptively Weak Passwords

AI-generated passwords from leading chatbots appear secure but harbor dangerous vulnerabilities, according to research from AI cybersecurity firm Irregular

1

2

. The company tested ChatGPT, Claude, and Gemini, finding that all three large language models produced fundamentally weak passwords with predictable password patterns that hackers could exploit. When Irregular prompted Claude's Opus 4.6 model 50 times to generate 16-character passwords with special characters, numbers, and mixed-case letters, only 30 unique passwords emerged. Twenty duplicates appeared, with 18 being the exact same string: K9#mPx$vL2nQ8wR

2

. The vast majority started and ended with identical characters, and none contained repeating characters—clear evidence these weren't truly random.

Source: The Register

Source: The Register

Password Security Illusion Masks Critical Flaws

Online password checkers rated these AI-generated passwords as extremely strong, with some estimating they would take centuries or even 129 million trillion years to crack

2

. This creates a dangerous illusion. Password security depends on unpredictability, but because large language models derive results from training data patterns rather than true randomness, they create only the appearance of strength.

Source: Sky News

Source: Sky News

Irregular co-founder Dan Lahav told Sky News: "You should definitely not do that. And if you've done that, you should change your password immediately"

2

. Tests with OpenAI's GPT-5.2 and Google's Gemini 3 Flash revealed similar consistencies, particularly at the beginning of password strings

1

.

Entropy Analysis Reveals Alarming Weakness

Irregular measured password strength using the Shannon entropy formula and character probability analysis. The findings were stark: 16-character passwords generated through LLM password generation showed entropy levels around 27 bits using character statistics and 20 bits using log probabilities

1

. Truly random passwords should register 98 bits and 120 bits respectively using these methods. This massive entropy gap means AI-generated passwords are vulnerable to cracking within hours, even on decades-old computers

1

. "Our best assessment is that currently, if you're using LLMs to generate your passwords, even old computers can crack them in a relatively short amount of time," Lahav explained

2

.

Developers Face Hidden AI Password Vulnerability Risks

The problem extends beyond individual users to developers increasingly relying on AI coding assistants. Searching GitHub for recognizable Claude password patterns like K9#mP returned 113 results, while Gemini patterns like k9#vL yielded 14 results

2

. These AI-generated passwords appear in test code, setup instructions, technical documentation, and potentially live servers. Anthropic CEO Dario Amodei predicted AI will write the majority of code

1

, amplifying this cybersecurity risk. Irregular warned that "passwords generated through direct LLM output are fundamentally weak, and this is unfixable by prompting or temperature adjustments: LLMs are optimized to produce predictable, plausible outputs, which is incompatible with secure password generation"

1

.

What Users Should Do About This Security Gap

Experts recommend immediate action for anyone who has used ChatGPT, Claude, Gemini, or other AI tools for password creation. Graeme Stewart from Check Point called it an "avoidable, high-impact when it goes wrong" issue with a simple fix: change those passwords now

2

. Developers should review and rotate any LLM-generated passwords in their code. Looking forward, the industry needs to address what Irregular calls the "gap between capability and behavior" as AI-assisted development accelerates

1

. Robert Hann from Entrust advocates for alternative authentication methods like passkeys using face and fingerprint ID

2

. When passwords remain necessary, experts universally advise choosing long, memorable phrases and using dedicated password managers like 1Password or Bitwarden for secure password generation—never asking an AI

1

.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo