AI weaponizes patches in 30 minutes, killing the 90-day vulnerability disclosure standard

2 Sources

Share

Security researchers warn that AI-assisted bug hunting has effectively killed the industry-standard 90-day vulnerability disclosure policy. LLMs can now identify and weaponize vulnerabilities within 30 minutes of patches being published, leaving systems exposed to zero-day attacks faster than traditional security teams can respond. The patching treadmill that once frustrated developers has become a full-blown crisis.

AI Transforms Vulnerability Discovery at Machine Speed

The landscape of application security has shifted dramatically as AI and LLMs accelerate both vulnerability discovery and exploitation. Security researcher Himanshu Anand recently declared the industry-standard 90-day vulnerability disclosure policy effectively dead, warning that attackers using AI-assisted bug hunting can now weaponize patches in just 30 minutes

2

. This development marks a fundamental break from traditional application security practices that relied on slower, human-paced review cycles.

Source: Tom's Hardware

Source: Tom's Hardware

Anand demonstrated this threat by creating an exploit for a published React framework vulnerability in 30 minutes using LLM tools

2

. The speed advantage stems from LLMs operating at full capacity around the clock, excelling at pattern recognition to identify the specific bad programming habits that underpin most security exploits. When Anand reported a zero-dollar purchase bug to an e-commerce platform, he discovered 10 other researchers had already flagged the same issue over six weeks, with LLM-assisted hunters converging on identical bugs almost simultaneously.

The Patching Treadmill Becomes a Crisis

Development teams already struggle with what's known as the patching treadmill—a frustrating cycle where security teams and scanners identify flaws, developers get pulled from new work to patch them, only to repeat the process as new code and dependencies introduce fresh vulnerabilities

1

. The find-and-fix cycle, coupled with defend-and-defer practices that add protective walls around deeply entrenched vulnerable code rather than fixing root causes, creates mounting vulnerability backlogs that overwhelm teams.

Source: ZDNet

Source: ZDNet

According to security platform provider Edgescan, network issues take an average of 54 days to fix while web applications require almost 75 days

1

. The situation worsens at large companies, where 45% of vulnerabilities remain unfixed after a full year. These delays create windows of opportunity that AI now exploits at unprecedented speed. Triage engineer @d0rsky observed that once a new vulnerability surfaces, "a wave of duplicate reports within days" follows, raising the critical question: if researchers can replicate findings so quickly, what stops black-hat actors from doing the same before fixes deploy

2

?

Software Development Cycles Collide With Security Realities

The acceleration of AI-assisted coding has intensified pressure on security teams. Continuous integration/continuous deployment (CI/CD) means software updates flow constantly rather than quarterly or annually

1

. Every tweak, sprint, dependency update, cloud configuration change, and AI-assisted coding session can introduce security risks faster than traditional teams can review them. When security teams do review code, they often uncover hundreds or thousands of problems, with issues being found faster than developers can realistically address them.

Recent Linux kernel vulnerabilities Copy Fail and Dirty Frag illustrated this new cyberworld order. Both exploited insecure zero-copy mechanisms and were disclosed publicly just over a week after discovery—far short of the usual 90-day period—because the exploits were already in the wild

2

. This reality renders monthly patch cycles equally obsolete, as the 30-day window between vulnerability and fix assumes attackers move slower than release schedules.

Integrating LLMs for Security Checks Becomes Essential

Anand's stark warning to developers: "If you're not integrating LLMs in your development pipeline for security checks, you've already lost"

2

. He urges teams to treat every critical security issue as priority zero and fix immediately, operating under the assumption that vulnerabilities are already under active exploitation. The advice reflects a harsh new reality: reading CVE descriptions while attackers analyze git logs puts defenders perpetually behind.

Open-source software faces a double-edged sword in this environment. While publicly available code traditionally enabled high security standards through community scrutiny, LLMs now analyze that same transparency to identify weaknesses at machine speed. Mozilla recently demonstrated the potential response velocity by posting 423 security fixes in April alone

2

. Closed-source software offers no sanctuary, as tireless bots prove equally adept at decompiling and network scanning as source code analysis.

The implications extend beyond technical fixes. Organizations must fundamentally rethink security workflows, accepting that the 90-day window protects nobody when ethical hackers and malicious actors alike leverage AI to converge on vulnerabilities simultaneously. The shift demands immediate action on critical flaws rather than queuing them in vulnerability backlogs that assume human-paced exploitation timelines no longer apply.

Today's Top Stories

TheOutpost.ai

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Instagram logo
LinkedIn logo
Youtube logo
© 2026 TheOutpost.AI All rights reserved