{"id":230,"date":"2026-05-01T05:15:19","date_gmt":"2026-05-01T05:15:19","guid":{"rendered":"https:\/\/blog.osto.one\/?p=230"},"modified":"2026-05-05T10:05:02","modified_gmt":"2026-05-05T10:05:02","slug":"your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built","status":"publish","type":"post","link":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/","title":{"rendered":"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built"},"content":{"rendered":"<p><!-- SEO: Lovable AI coding breach 2026 | vibe coding security vulnerability | Supabase RLS misconfiguration data exposed --><\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Lovable is one of the most popular AI coding platforms for founders and indie developers. You describe what you want to build, Lovable writes the code, connects it to a Supabase database, and has a working app running in minutes. No backend engineering required. No DevOps overhead. Ship fast.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">In April 2026, a security researcher disclosed that any free Lovable account could read another user&#8217;s source code, database credentials, AI chat history, and customer data. Every project built on the platform before November 2025 was exposed.<\/p>\n<p><!-- OPENING HIT --><\/p>\n<div style=\"background:#FFF8F8;border-left:5px solid #D94040;padding:20px 24px;margin:28px 0;border-radius:2px;\">\n<p style=\"font-size:17px;font-weight:600;color:#D94040;margin:0;line-height:1.65;\">The attacker did not need to exploit a vulnerability in your code. Lovable wrote the vulnerability into your code for you. Thousands of developers shipped it to production without knowing it was there.<\/p>\n<\/div>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">What Lovable does and why this matters<\/h2>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Lovable generates full-stack applications from natural language prompts. The frontend runs in the browser. The backend uses Supabase, a platform that exposes a PostgreSQL database directly through a public API. This is a legitimate, powerful architecture. Supabase is used by thousands of production applications.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">The critical detail is how Supabase controls access to database tables: through a feature called Row Level Security (RLS). RLS policies define which users can see which rows. Without them, any caller holding the public API key \u2014 which is embedded in every Supabase client application and designed to be public \u2014 can read every row in every table.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Lovable&#8217;s generated code called Supabase directly from the browser using the public anon key, without attaching the RLS policies that restrict what that key can access. The database was open to anyone who found the endpoint.<\/p>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">The numbers<\/h2>\n<p><!-- STAT ROW --><\/p>\n<div style=\"display:flex;gap:12px;margin:20px 0 32px;flex-wrap:wrap;\">\n<div style=\"flex:1;min-width:150px;background:#EEF1FB;border-top:4px solid #1C267A;padding:20px 20px;border-radius:2px;text-align:center;\">\n<div style=\"font-size:36px;font-weight:700;color:#1C267A;line-height:1;\">1,645<\/div>\n<div style=\"font-size:12px;color:#6B7A99;text-transform:uppercase;letter-spacing:0.1em;margin-top:6px;\">apps scanned<\/div>\n<\/p><\/div>\n<div style=\"flex:1;min-width:150px;background:#FFF8F8;border-top:4px solid #D94040;padding:20px 20px;border-radius:2px;text-align:center;\">\n<div style=\"font-size:36px;font-weight:700;color:#D94040;line-height:1;\">170<\/div>\n<div style=\"font-size:12px;color:#888;text-transform:uppercase;letter-spacing:0.1em;margin-top:6px;\">apps with exposed databases<\/div>\n<\/p><\/div>\n<div style=\"flex:1;min-width:150px;background:#FFF8F8;border-top:4px solid #D94040;padding:20px 20px;border-radius:2px;text-align:center;\">\n<div style=\"font-size:36px;font-weight:700;color:#D94040;line-height:1;\">303<\/div>\n<div style=\"font-size:12px;color:#888;text-transform:uppercase;letter-spacing:0.1em;margin-top:6px;\">vulnerable endpoints found<\/div>\n<\/p><\/div>\n<\/div>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">That is roughly one in ten of the apps scanned. Each vulnerable app had at least one endpoint where an unauthenticated attacker could dump entire database tables without logging in. The exposed data found across these apps included user emails, home addresses, personal debt amounts, payment records, and API keys from connected services.<\/p>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">The timeline that should concern every platform user<\/h2>\n<p><!-- TIMELINE --><\/p>\n<div style=\"margin:20px 0 32px;display:flex;flex-direction:column;gap:2px;\">\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:14px 18px;background:#FAFBFF;border:1px solid #EEF1FB;\">\n<div style=\"min-width:100px;font-size:11px;font-weight:700;letter-spacing:0.1em;text-transform:uppercase;color:#1C267A;padding-top:2px;\">March 2025<\/div>\n<div style=\"font-size:14px;color:#333;line-height:1.65;\">Security researcher Matt Palmer reports the RLS vulnerability to Lovable with proof-of-concept examples showing unauthenticated data access.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:14px 18px;background:#FAFBFF;border:1px solid #EEF1FB;\">\n<div style=\"min-width:100px;font-size:11px;font-weight:700;letter-spacing:0.1em;text-transform:uppercase;color:#1C267A;padding-top:2px;\">April 2025<\/div>\n<div style=\"font-size:14px;color:#333;line-height:1.65;\">A Palantir engineer independently discovers and publicly tweets the same issue. Live apps shown leaking personal debt amounts, home addresses, and API keys. Lovable releases a &#8220;security scan&#8221; feature \u2014 but the scanner only checks whether an RLS policy exists, not whether it actually works.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:14px 18px;background:#FAFBFF;border:1px solid #EEF1FB;\">\n<div style=\"min-width:100px;font-size:11px;font-weight:700;letter-spacing:0.1em;text-transform:uppercase;color:#1C267A;padding-top:2px;\">May 2025<\/div>\n<div style=\"font-size:14px;color:#333;line-height:1.65;\">CVE-2025-48757 is formally published after the 45-day disclosure window closes without a meaningful fix.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:14px 18px;background:#FFF8F8;border:1px solid #fdd;\">\n<div style=\"min-width:100px;font-size:11px;font-weight:700;letter-spacing:0.1em;text-transform:uppercase;color:#D94040;padding-top:2px;\">April 2026<\/div>\n<div style=\"font-size:14px;color:#333;line-height:1.65;\">A third major security event: platform-level tenant isolation failure. Any free Lovable account can access another user&#8217;s source code, database credentials, AI chat history, and customer data. Every project before November 2025 is exposed. This is the third distinct failure mode in thirteen months.<\/div>\n<\/p><\/div>\n<\/div>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">Why this is not a Lovable problem. It is an industry problem.<\/h2>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Lovable is the most visible example of a pattern happening across every AI coding platform. The Cloud Security Alliance tracked at least 20 documented security incidents exposing tens of millions of users across AI-powered applications between January 2025 and February 2026. Nearly every incident traced back to the same preventable root causes: missing authorization, exposed secrets in client code, and weak multi-tenant isolation.<\/p>\n<blockquote style=\"margin:28px 0;padding:22px 28px;background:#EEF1FB;border-left:5px solid #1C267A;border-radius:2px;\">\n<p style=\"font-size:17px;font-style:italic;font-weight:500;color:#1C267A;margin:0;line-height:1.7;\">When a platform embeds an insecure default, every application built on that platform inherits the vulnerability. The developer who shipped the app had no idea. The users whose data was exposed had no idea. The only people who knew were the researchers who went looking and the attackers who didn&#8217;t announce themselves.<\/p>\n<\/blockquote>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Enterprise AI adoption grew 187% between 2023 and 2025. AI coding tools in particular have compressed the time between &#8220;idea&#8221; and &#8220;live production app with real user data&#8221; from months to hours. The security review process has not compressed at the same rate.<\/p>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">If you have built anything on Lovable, do this now<\/h2>\n<ul style=\"margin:16px 0 28px;padding-left:0;list-style:none;\">\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#FFF8F8;border-left:3px solid #D94040;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#D94040;font-size:16px;flex-shrink:0;margin-top:2px;\">!<\/span><br \/>\n    <span>Rotate every Supabase anon key and service role key used in any Lovable project immediately. Treat them as compromised.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#FFF8F8;border-left:3px solid #D94040;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#D94040;font-size:16px;flex-shrink:0;margin-top:2px;\">!<\/span><br \/>\n    <span>Check <code style=\"background:#f5f5f5;padding:2px 6px;font-size:13px;border-radius:2px;\">pg_policies<\/code> in your Supabase database and verify that every table that holds user data has an RLS policy that actually restricts access \u2014 not just a policy that exists.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span>Test your RLS policies from the client SDK, not from the Supabase SQL Editor. The SQL Editor bypasses RLS entirely and will show you all data regardless of what your policies say.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span>Never store sensitive credentials, API keys, or PII in any Lovable project&#8217;s source code or chat history. They are part of the exposure surface.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span>If your app handles real user data, treat it like any other production vendor: review it against your SOC 2 or security framework controls before it goes live with customer data.<\/span>\n  <\/li>\n<\/ul>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">The broader lesson<\/h2>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">AI coding tools are genuinely useful. They compress development time, lower the barrier to building, and let small teams ship products that would have required much larger engineering teams a few years ago.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">But the AI writes code the way a developer who has never been paged at 2am about a data breach writes code. It optimises for the thing working, not for the thing being secure. The developer who reviews the generated code may not catch what the AI missed. The security review that would catch it is the step that gets skipped because the whole point of the tool was to move fast.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">The Lovable breach is the logical outcome of shipping AI-generated code handling real user data without an independent security review. It is the third time on the same platform in thirteen months. The pattern is not going to stop on its own.<\/p>\n<p><!-- INTEGRATED OSTO CTA --><\/p>\n<div style=\"background:#1C267A;padding:32px 36px;border-radius:2px;margin-top:48px;\">\n<div style=\"font-size:11px;font-weight:700;letter-spacing:0.2em;text-transform:uppercase;color:rgba(255,255,255,0.45);margin-bottom:12px;\">The review the AI skipped<\/div>\n<p style=\"font-size:17px;font-weight:600;color:white;margin:0 0 14px;line-height:1.5;\">Every app you ship with real user data needs a security review that the AI coding tool cannot do for itself.<\/p>\n<p style=\"font-size:15px;color:rgba(255,255,255,0.75);margin:0 0 14px;line-height:1.75;\">Osto runs penetration tests and source code assessments on AI-generated and traditionally built applications alike, identifying the authorization gaps, exposed credentials, and misconfigured access controls that ship silently into production. If you are building on Lovable, Cursor, or any AI coding platform and handling real customer data, a VAPT scoped to your application is the check that tells you whether what the AI wrote is actually safe to ship.<\/p>\n<p style=\"font-size:15px;color:rgba(255,255,255,0.75);margin:0 0 24px;line-height:1.75;\">The Lovable breach took thirteen months and three incidents to surface publicly. Your users&#8217; data does not have thirteen months to wait.<\/p>\n<p>  <a href=\"https:\/\/osto.one\" style=\"display:inline-block;background:#C8FF00;color:#1C267A;font-size:13px;font-weight:700;padding:12px 24px;text-decoration:none;letter-spacing:0.05em;border-radius:2px;\">Talk to us at Osto<\/a>\n<\/div>\n<\/div>\n<\/div>\n<p><textarea id=\"copy-src\" style=\"position:absolute;left:-9999px;top:-9999px;\"><\/textarea><br \/>\n<script>\nfunction copyContent() {\n  const content = document.getElementById('blog-content').innerHTML;\n  const ta = document.getElementById('copy-src');\n  ta.value = content.trim();\n  ta.select();\n  document.execCommand('copy');\n  navigator.clipboard.writeText(content.trim()).catch(()=>{});\n  const btn = document.querySelector('.copy-btn');\n  btn.textContent = 'Copied!';\n  btn.classList.add('done');\n  setTimeout(() => { btn.textContent = 'Copy WordPress HTML'; btn.classList.remove('done'); }, 2500);\n}\n<\/script><br \/>\n<\/body><br \/>\n<\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lovable is one of the most popular AI coding platforms for founders and indie developers. You describe what you want\u2026<\/p>\n","protected":false},"author":5,"featured_media":248,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"class_list":["post-230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-incidents"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built - Osto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built - Osto\" \/>\n<meta property=\"og:description\" content=\"Lovable is one of the most popular AI coding platforms for founders and indie developers. You describe what you want\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\" \/>\n<meta property=\"og:site_name\" content=\"Osto\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T05:15:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T10:05:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ansh Satwani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ansh Satwani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\"},\"author\":{\"name\":\"Ansh Satwani\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144\"},\"headline\":\"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built\",\"datePublished\":\"2026-05-01T05:15:19+00:00\",\"dateModified\":\"2026-05-05T10:05:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\"},\"wordCount\":1053,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png\",\"articleSection\":[\"Incidents\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\",\"url\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\",\"name\":\"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built - Osto\",\"isPartOf\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png\",\"datePublished\":\"2026-05-01T05:15:19+00:00\",\"dateModified\":\"2026-05-05T10:05:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage\",\"url\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png\",\"contentUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.osto.one\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.osto.one\/resources\/#website\",\"url\":\"https:\/\/www.osto.one\/resources\/\",\"name\":\"Osto\",\"description\":\"Osto secures apps, networks, and endpoints with an integrated platform built for modern teams.\",\"publisher\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.osto.one\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.osto.one\/resources\/#organization\",\"name\":\"Osto\",\"url\":\"https:\/\/www.osto.one\/resources\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png\",\"contentUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png\",\"width\":1144,\"height\":428,\"caption\":\"Osto\"},\"image\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144\",\"name\":\"Ansh Satwani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g\",\"caption\":\"Ansh Satwani\"},\"url\":\"https:\/\/www.osto.one\/resources\/author\/ansh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built - Osto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/","og_locale":"en_US","og_type":"article","og_title":"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built - Osto","og_description":"Lovable is one of the most popular AI coding platforms for founders and indie developers. You describe what you want\u2026","og_url":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/","og_site_name":"Osto","article_published_time":"2026-05-01T05:15:19+00:00","article_modified_time":"2026-05-05T10:05:02+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png","type":"image\/png"}],"author":"Ansh Satwani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ansh Satwani","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#article","isPartOf":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/"},"author":{"name":"Ansh Satwani","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144"},"headline":"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built","datePublished":"2026-05-01T05:15:19+00:00","dateModified":"2026-05-05T10:05:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/"},"wordCount":1053,"commentCount":0,"publisher":{"@id":"https:\/\/www.osto.one\/resources\/#organization"},"image":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage"},"thumbnailUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png","articleSection":["Incidents"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/","url":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/","name":"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built - Osto","isPartOf":{"@id":"https:\/\/www.osto.one\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage"},"image":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage"},"thumbnailUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png","datePublished":"2026-05-01T05:15:19+00:00","dateModified":"2026-05-05T10:05:02+00:00","breadcrumb":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#primaryimage","url":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png","contentUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-11_55_23-AM.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.osto.one\/resources\/incidents\/your-ai-coding-tool-wrote-the-security-vulnerability-into-every-app-it-built\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.osto.one\/resources\/"},{"@type":"ListItem","position":2,"name":"Your AI Coding Tool Wrote the Security Vulnerability Into Every App It Built"}]},{"@type":"WebSite","@id":"https:\/\/www.osto.one\/resources\/#website","url":"https:\/\/www.osto.one\/resources\/","name":"Osto","description":"Osto secures apps, networks, and endpoints with an integrated platform built for modern teams.","publisher":{"@id":"https:\/\/www.osto.one\/resources\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.osto.one\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.osto.one\/resources\/#organization","name":"Osto","url":"https:\/\/www.osto.one\/resources\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/","url":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png","contentUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png","width":1144,"height":428,"caption":"Osto"},"image":{"@id":"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144","name":"Ansh Satwani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g","caption":"Ansh Satwani"},"url":"https:\/\/www.osto.one\/resources\/author\/ansh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts\/230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/comments?post=230"}],"version-history":[{"count":2,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts\/230\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts\/230\/revisions\/232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/media\/248"}],"wp:attachment":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/media?parent=230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/categories?post=230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/tags?post=230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}