I Audited My Own Vibe-Coded App. Here Is What I Found.
I built a SaaS with Cursor in a weekend. Then I ran our own security testing tool against it. 14 vulnerabilities in 45 minutes.
Intelligence Feed
The Sherlock Forensics Intelligence Feed provides expert analysis of AI code security, vibe coding vulnerabilities, CVE advisories and digital forensics methodologies from certified examiners with over 20 years of field experience in Vancouver, BC.
Featured Analysis
I built a SaaS with Cursor in a weekend. Then I ran our own security testing tool against it. 14 vulnerabilities in 45 minutes.
Took us 4 minutes to find the database password. passwords.txt in the public directory. A war story of escalating findings from one engagement.
15 practical security checks for AI-generated code. Each item includes what to check, why it matters and a copy-paste fix you can use right now.
How .env files end up exposed in apps built with Cursor, Bolt and Lovable. How to check if yours is leaking and how to fix it in 5 minutes.
92% had critical vulnerabilities. 78% stored secrets in plaintext. Data-driven analysis with visual breakdowns by vulnerability category and AI tool.
Experience catches business logic flaws, court-admissible documentation and auditor-ready reports. What 20 years and CISSP/ISSAP/ISSMP certifications actually deliver.
A buyer's guide covering certifications, manual testing, compliance reports, retesting, expert witness capability and more. With Sherlock's answers to each.
Default credentials, missing rate limiting, exposed admin panels, SQL injection and more. The 10 most common findings from real pentests with severity ratings.
Seven essential security prompts to paste into your AI coding tool before deploying. Catch broken auth, injection flaws, exposed secrets and more.
The security gap between mandating AI coding tools and auditing what they produce. References Linus Torvalds, Zuckerberg and the enterprise accountability problem.
Practical npm and pip verification commands to confirm AI-suggested packages exist before installing them. Prevent supply chain attacks from hallucinated dependencies.
A 7-point checklist for CPAs reviewing SOC 2 pentest reports. Scope, methodology, CVSS findings, remediation status, retest evidence and red flags.
Transparent pricing from $1,500 to $25,000+ CAD. Four tiers compared to industry averages, cost factors and why cheap pentests are expensive.
Aggregate data from hundreds of engagements. Default credentials, SQL injection, broken access controls and more, with severity ratings and fixes.
Clear comparison of pentests, vulnerability scans, bug bounties and red teams. Table format with costs, use cases and a decision tree.
Step-by-step walkthrough of a real engagement. Scoping, reconnaissance, exploitation, reporting and debrief demystified for founders and CTOs.
Penetration testing explained in plain language. What it is, why it matters, what happens during one, what the report looks like and how much it costs.
Side-by-side comparison for CTOs. Pros, cons, costs and a decision framework for choosing between pentests and bug bounty programs.
A detailed day-by-day walkthrough of a standard penetration test. Scoping, reconnaissance, active testing, exploitation, reporting and debrief.
The most common API vulnerabilities mapped to the OWASP API Security Top 10. Broken auth, BOLA, mass assignment, rate limiting and SSRF with real findings.
How to tell a good pentest report from a bad one. Red flags, green flags and what to demand from your security vendor.
SOC 2 penetration testing requirements for startups. What the standard requires, how to scope, timing and what auditors look for in the report.
Top 5 findings from the 2026 AI Code Security Report. 92% of AI-generated codebases have critical vulnerabilities. 88% lack rate limiting. 78% expose secrets.
Aggregate data from 50 AI code audits. 92% had critical vulnerabilities, 78% stored secrets in plaintext and 54% had SQL injection. Vibe-coded vs professional comparison.
Anonymized case study. 3-person SaaS startup built with Cursor. 8 critical vulnerabilities found in a $1,500 quick audit and fixed in 2 days.
$1,500 audit vs $4.88M breach. The math of prevention vs doing nothing, including PIPEDA fines, cyber insurance and reputation damage.
The 10 most common security disasters in vibe-coded authentication. Plaintext passwords, client-side auth, exposed .env files and more.
Ten checks you can run right now. If you fail more than two you need a professional audit before launch.
A realistic 60-minute attack walkthrough on a typical vibe-coded SaaS. From recon to database dump to Stripe access.
Decision tree for founders. If it handles user data, processes payments or has login, the answer is yes.
Directory traversal, server misconfiguration and zero hashing. Why flat file password storage is catastrophic and what to use instead.
AI slop ships fast and breaks faster. Unreviewed AI-generated code carries injection flaws, hallucinated dependencies and hardcoded secrets that survive to production.
Working code is not secure code. AI writes functional applications that hide auth bypasses, injectable queries and unprotected API endpoints.
You built it in a weekend with Cursor. An attacker dismantled it in an afternoon. The incident response playbook for AI-built applications.
Nine security categories every CTO must check before shipping AI-generated code. Dependency verification, secrets scanning, auth review and more.
Hallucinated packages, weak randomness, SQL injection, hardcoded secrets and insecure deserialization. The five patterns we find in every AI code audit.
Anthropic's Claude Mythos found thousands of zero-days for under $50 each. Over 99% remain unpatched.
The rise of non-developers shipping production apps and why scanning alone is not enough to secure vibe coded software.
EU AI Act, NIST AI RMF and investor expectations are making AI security audits a pre-launch requirement.
Documented cases of AI systems being exploited in production. Prompt injection, model poisoning and supply chain attacks with real-world impact.
A forensic examination of AI attack surfaces. Model extraction, data poisoning, adversarial inputs and the security gaps most teams overlook.
Employees are using AI tools you did not approve on data you did not authorize. The compliance and security implications are significant.
The tools our team actually uses on engagements. From reconnaissance to exploitation to reporting.
What Canadian businesses need to know about PIPEDA compliance, data breach notification and privacy impact assessments.
How evolving post-quantum encryption standards are reshaping volatile memory analysis and what forensic examiners must adapt.
A forensic methodology for authenticating digital evidence when AI-generated media enters the courtroom.
Investors are asking about security posture. Here is what a pre-funding penetration test actually covers and why waiting costs more.
CVE Intelligence
High and critical vulnerabilities relevant to cloud, web and AI infrastructure. Updated daily from the National Vulnerability Database.
| CVE | Severity | CVSS | Affected Product | Vulnerability |
|---|---|---|---|---|
| CVE-2026-23696 | CRITICAL | 9.9 | Windmill CE/EE | SQL injection in folder ownership management |
| CVE-2021-4473 | CRITICAL | 9.8 | Tianxin Management System | Command injection in Reporter component |
| CVE-2026-22679 | CRITICAL | 9.8 | Weaver E-cology 10.0 | Unauthenticated RCE via debug endpoint |
| CVE-2026-3296 | CRITICAL | 9.8 | Everest Forms (WordPress) | PHP Object Injection via deserialization |
| CVE-2026-4631 | CRITICAL | 9.8 | Cockpit (Linux) | SSH command injection via login endpoint |
| CVE-2026-1346 | CRITICAL | 9.3 | IBM Verify Identity Access | Privilege escalation for local users |
| CVE-2026-22683 | HIGH | 8.8 | Windmill | Missing authorization bypasses operator restrictions |
| CVE-2026-3357 | HIGH | 8.8 | IBM Langflow Desktop | Insecure FAISS deserialization enables code execution |
| CVE-2026-1342 | HIGH | 8.5 | IBM Verify Identity Access | Local users can execute malicious scripts |
| CVE-2026-4788 | HIGH | 8.4 | IBM Tivoli Netcool Impact | Sensitive data exposure in log files |
| CVE-2026-4740 | HIGH | 8.2 | Red Hat ACM / Open Cluster Mgmt | Certificate forgery via improper validation |
| CVE-2026-5736 | HIGH | 7.3 | PowerJob | detailPlus endpoint manipulation |
| CVE-2026-5739 | HIGH | 7.3 | PowerJob | Code injection via OpenAPI workflow endpoint |
| CVE-2026-5741 | HIGH | 7.3 | docker-mcp-server | OS command injection via HTTP interface |
| CVE-2026-1343 | HIGH | 7.2 | IBM Verify Identity Access | SSRF exposes internal auth endpoints |
| CVE-2026-22682 | HIGH | 7.1 | OpenHarness | Improper access control exposes local files |