Vibe Coding Exposes 5,000 Apps with Sensitive Data as Shadow AI Security Crisis Escalates

Reviewed byNidhi Govil

2 Sources

Share

Israeli cybersecurity firm RedAccess discovered 380,000 publicly accessible assets built with vibe coding tools, with 5,000 containing sensitive corporate, medical, and financial information. The findings highlight critical data security vulnerabilities as non-technical users create AI-generated applications without proper safeguards, exposing patient records, banking data, and corporate strategy documents.

Massive Security Breach Reveals Scale of Vibe Coding Risks

Vibe coding has triggered a sprawling security crisis across enterprise environments, with Israeli cybersecurity firm RedAccess uncovering 380,000 publicly accessible assets built using AI-generated applications from platforms including Lovable, Base44, Replit, and deployment service Netlify

2

. Among these discoveries, approximately 5,000 assets—roughly 1.3% of the total—contained sensitive data ranging from medical information to financial information and corporate strategy documents

1

. Security researcher Dor Zvi led the investigation, which Axios and Wired independently verified, confirming multiple exposed corporate apps with virtually no security or authentication mechanisms in place

2

.

Source: VentureBeat

Source: VentureBeat

The exposed sensitive data included hospital work assignments containing personally identifiable information of doctors, patient conversations at children's long-term care facilities, and doctor-patient summaries

1

2

. Financial exposures ranged from internal banking data at a Brazilian institution to sales records across multiple companies, while corporate intelligence leaks included go-to-market strategy presentations and ad purchasing plans

2

. In some cases, anyone discovering the correct URL could access these applications and their data, while other citizen-built applications required only trivial barriers such as signing in with any email address

1

.

Democratization of App Development Creates Emerging Security Gap

The core problem stems from how prompt-to-app approaches enable users without technical expertise to build functional applications in hours, yet these same users lack security knowledge to protect what they create. Security researcher Joel Margolis explained the fundamental challenge: "Somebody from a marketing team wants to create a website. They're not an engineer and they probably have little to no security background or knowledge"

1

. Unless specifically instructed to build secure applications, AI-generated code defaults to functionality over protection, creating data security vulnerabilities at scale

1

.

Privacy settings on several vibe coding platforms default to making apps publicly accessible unless users manually switch them to private, with many applications getting indexed by Google and other search engines

2

. Zvi captured the education challenge bluntly: "I don't think it's feasible to educate the whole world around security. My mother is [vibe coding] with Lovable, and no offense, but I don't think she will think about role-based access"

2

. This democratization of app development has created what enterprise security teams now recognize as shadow AI's production layer—applications built outside IT oversight that connect to live databases and process real business data

2

.

Source: PC Magazine

Source: PC Magazine

Shadow AI Breaches Carry $4.63 Million Price Tag

IBM's 2025 Cost of a Data Breach Report found that 20% of organizations experienced breaches linked to shadow AI, with those incidents adding $670,000 to average breach costs, pushing shadow AI breach totals to $4.63 million

2

. Among organizations reporting AI-related breaches, 97% lacked proper access controls while 63% had no AI governance policy in place

2

. These shadow AI breaches disproportionately exposed customer personally identifiable information at 65%, compared to 53% across all breaches, with affected data distributed across multiple environments 62% of the time

2

.

Gartner's "Predicts 2026" report forecasts that by 2028, prompt-to-app approaches adopted by citizen developers will increase software defects by 2,500%

2

. Gartner identifies a new defect class where AI generates syntactically correct code that lacks awareness of broader system architecture and nuanced business rules, with remediation costs consuming budgets previously allocated to innovation

2

. Separate research from Escape.tech in October 2025 scanned 5,600 publicly available vibe-coded applications and discovered over 2,000 high-impact vulnerabilities, more than 400 exposed secrets including API keys, and 175 instances of personal data exposure containing patient records and bank account numbers

2

.

Platform Responses and Regulatory Implications

Blake Brodie, spokesperson for Wix which owns Base44, told Axios that RedAccess "deliberately withheld the URLs that would have allowed us to identify and examine the applications in question," adding that exposed applications had been "deliberately set to public by their owners"

1

. Brodie also noted that two Base44-produced websites examined appeared to be test sites or contained AI-generated data

1

. Samyutha Reddy, spokesperson for Lovable, stated that RedAccess's research did not "include any URLs or technical specifics that would allow us to verify, investigate, or act on the findings described," though the company began investigating

1

.

Depending on jurisdiction and data types involved, healthcare and financial exposures may trigger regulatory obligations under HIPAA, UK GDPR, or Brazil's LGPD

2

. RedAccess also identified phishing sites built on Lovable impersonating Bank of America, FedEx, Trader Joe's, and McDonald's, with Lovable confirming it had begun investigating and removing these sites

2

. CISOs now face a choice between treating this as a policy problem requiring memos or as an architecture problem demanding deployment of discovery scanning across vibe coding domains, pre-deployment security review, and extending existing AppSec pipelines to citizen-built applications

2

.

Today's Top Stories

TheOutpost.ai

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Instagram logo
LinkedIn logo
Youtube logo
© 2026 TheOutpost.AI All rights reserved