# cwe
2 articlestagged with “cwe”
CWE Mapping for AI-Generated Vulnerabilities
Common AI-generated vulnerabilities mapped to CWE identifiers with real examples: SQL injection (CWE-89), XSS (CWE-79), path traversal (CWE-22), command injection (CWE-78), and hardcoded credentials (CWE-798).
cwesql-injectionxsspath-traversalcommand-injectionhardcoded-credentialsvulnerability-patterns
AI-Generated Vulnerability Patterns
Overview of common vulnerability patterns in AI-generated code, including why models produce insecure code and how these patterns differ from human-introduced vulnerabilities.
vulnerability-patternsai-generated-codecwecode-qualitysecurity-analysis