AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

AI Zero-Day Exploit, CI/CD Supply Chain Poisoning, and Vibe-Coded Data Exposure

This episode explores how modern development's trust assumptions keep failing in attackers' favor, from the first confirmed AI-written zero-day to a coordinated supply chain attack poisoning 518 million download paths, developer credential harvesting via rootkit, AWS SES abuse for phishing at scale, and thousands of vibe-coded apps leaking sensitive data in the open web.

When the Tools You Trust Become the Weapons Used Against You

Six stories this week, one thread: the assumptions holding up modern development (trusted pipelines, trusted infrastructure, trusted platforms) keep failing in exactly the ways attackers expected. Here's what stood out from the operator's chair.

Confirmed AI-assisted exploit development means the patch window just got shorter. Google's threat intelligence group documented what may be the first confirmed case of an attacker using AI to write a real zero-day, an auth logic flaw in a popular open-source admin tool caught before the campaign launched. The tell was the code: educational doc strings, a hallucinated CVSS score, textbook-clean Python that experienced exploit developers don't write. The interesting question isn't whether it's confirmed -- it's how long this has been happening undetected. AI compresses the kill chain hardest at weaponization. Companies taking 60 days to patch are in a different threat environment than they think.

Compromising one maintainer now means 518 million download paths. A coordinated supply chain campaign poisoned packages across TanStack, Mistral AI, UiPath, OpenSearch, and Guardrails AI via GitHub Actions cache poisoning, stealing OIDC tokens to publish malicious versions with valid SLSA attestation. Standard integrity checks passed. Running untrusted code in a build pipeline is functionally identical to clicking an executable someone emailed you. Real-world attackers have no rules of engagement.

A developer workstation is a key to everything, not just an endpoint. Trend Micro documented a Linux RAT purpose-built to harvest developer credentials (GitHub CLI, AWS CLI, Docker, NPM) running in memory, spoofing process names, deploying kernel-level rootkit functionality. Landing on a developer machine is often one or two hops from full infrastructure control. AWS credentials are effectively domain admin over an environment nobody has a complete map of.

Trusted infrastructure is C2 now, and IP reputation won't catch it. Phishing campaigns are running through compromised AWS SES accounts, originating from Amazon's own IP space and passing reputation checks cleanly. AWS called it working as designed. That's the point. IP filtering doesn't work when the attacker operates from ranges you're already allowing. Active hunting for malicious infrastructure use is the bar.

Five thousand vibe-coded apps in the open web, 40% leaking sensitive data. Researchers found publicly exposed AI-generated apps built with Lovable, Replit, and similar tools serving up medical records, financial info, and internal documents with no authentication, built by employees solving problems quickly and invisible to any security team. No exploit required. The ability to ship software has outrun anyone's ability to know it exists.

OpenAI's security research tier won't close the gap it's meant to close. OpenAI launched Daybreak, a GPT-5.5-based cybersecurity initiative with tiered access for defenders and authorized red teamers. The team's read: actors already have access to capable models at low cost, and jailbreaking a cheaper tier is trivially achievable. The question isn't whether defenders can afford the permissive tier. It's whether the detection and patching workflows it's supposed to improve will actually move faster.

The takeaway. Speed is the compromise. Every story this week was downstream of somebody moving fast and trusting the system would hold. Pick your poison carefully.

Security Headlines:


Sean McMillan Headshot

About the speaker, Sean McMillan

Community Manager

Sean McMillan is Community Manager at Bishop Fox, focused on making complex security topics easier to understand and more interesting to follow. He holds a bachelor’s degree in Mass Communication and Media Studies from Arizona State University and brings over a decade of experience in podcasting, live hosting, and audience engagement. As host of Initial Access, he works with practitioners to explore how real-world attacks actually happen.


Sergio Villegas BF Headshot

About the speaker, Sergio Villegas

Senior Analyst II

Sergio Villegas is a Senior Analyst II in the Attack Surface Intelligence team at Bishop Fox where he is one of the lead researchers. His main areas of focus are emerging threats, attack surface mapping, and tactical lead generation. Sergio has over 11 years of experience in cybersecurity during which he has worked as a researcher and consultant to help companies improve their procedures, technologies, and techniques around threat intelligence and threat hunting.


Shad Malloy Headshot

About the speaker, Shad Malloy

Managing Senior Consultant II

Shad Malloy is a Managing Senior Consultant II at Bishop Fox focused on network penetration testing, vulnerability risk management, and application security. He has advised multiple industries including health care, financial services, energy, and technology. In addition to time working and managing security for education, health care, and national government agencies. Shad holds a Bachelor of Science in Computer Information Systems as well as industry certifications like the CISSP.


Bfx25 Thomas Wilson Bio

About the speaker, Thomas Wilson

Senior Red Team Operator

Thomas Wilson is a senior red team operator at Bishop Fox and a musician. From IDEs to DAWs, he is as at home on his own computer as he is on someone else's. You can usually find him at the local card shop slinging spells, up on stage blasting tunes, or with his eyes glued to his monitor for hours at a time (thank goodness for blue light filtering lenses).

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.