# vulnerability-patterns
3 articlestagged with “vulnerability-patterns”
CWE Mapping for AI-Generated Vulnerabilities
Common AI-generated vulnerabilities mapped to CWE identifiers with real examples: SQL injection (CWE-89), XSS (CWE-79), path traversal (CWE-22), command injection (CWE-78), and hardcoded credentials (CWE-798).
cwesql-injectionxsspath-traversalcommand-injectionhardcoded-credentialsvulnerability-patterns
AI-Generated Vulnerability Patterns
Overview of common vulnerability patterns in AI-generated code, including why models produce insecure code and how these patterns differ from human-introduced vulnerabilities.
vulnerability-patternsai-generated-codecwecode-qualitysecurity-analysis
Language-Specific Risks in AI-Generated Code
Language-specific security risks in AI-generated code: Python (pickle, eval, subprocess), JavaScript (prototype pollution, eval), Rust (unsafe blocks), and Go (SQL injection in string formatting).
pythonjavascriptrustgolanguage-specificvulnerability-patternsai-generated-code