48 days of exposed projects, closed bug reports, & the structural failure of vibe coding security


Summary: Lovable, the $6.6 billion vibe coding platform with eight million users, has faced three documented security incidents exposing source code, database credentials, and thousands of user records, with the most recent BOLA vulnerability left open for 48 days after the company closed a bug bounty report without escalation. The incidents are representative of a structural problem across vibe coding: 40-62% of AI-generated code contains vulnerabilities, 91.5% of vibe-coded apps had at least one AI hallucination-related flaw in Q1 2026, and the market’s incentive structure rewards growth over security at a moment when 60% of all new code is projected to be AI-generated by year end.

Lovable, the vibe coding platform valued at $6.6 billion with eight million users, has spent the past two months dealing with security incidents that collectively exposed source code, database credentials, AI chat histories, and the personal data of thousands of users across projects built on its platform. The most recent disclosure, published on 20 April by a security researcher, revealed a broken object-level authorisation vulnerability in Lovable’s API that allowed anyone with a free account to access another user’s profile, public projects, source code, and database credentials in as few as five API calls. The researcher reported the flaw to Lovable’s bug bounty programme on 3 March. Lovable patched it for new projects but never fixed it for existing ones, marked a follow-up report as a duplicate, and closed it. As of reporting, the vulnerability had been open for 48 days.

Lovable’s response followed a pattern that security researchers found more telling than the vulnerability itself. The company first posted on X that it “did not suffer a data breach,” calling the exposed data “intentional behaviour.” It then blamed its own documentation, saying that what “public” implies “was unclear.” It then blamed its bug bounty partner HackerOne, saying reports were “closed without escalation because our HackerOne partners thought that seeing public projects’ chats was the intended behaviour.” Later that day, it issued a partial apology acknowledging that “pointing to documentation issues alone was not enough.” Cybernews headlined its coverage: “Lovable goes on ego trip denying vulnerability, then blames others for said vulnerability.

What was exposed

The April incident affected projects created before November 2025. The researcher demonstrated that extracting a user’s source code from Lovable’s API also yielded hardcoded Supabase database credentials embedded in that code. One affected project belonged to Connected Women in AI, a Danish nonprofit. Its exposed data contained real user records including names, job titles, LinkedIn profiles, and Stripe customer IDs, with records linked to individuals at Accenture Denmark and Copenhagen Business School. Employees at Nvidia, Microsoft, Uber, and Spotify reportedly have Lovable accounts tied to affected projects.

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol’ founder Boris, and some questionable AI art. It’s free, every week, in your inbox. Sign up now!

This was the third documented security incident involving the platform. In February, a tech entrepreneur named Taimur Khan found 16 vulnerabilities, six of them critical, in a single app hosted on Lovable and featured on its own Discover page with more than 100,000 views. The most severe was an inverted authentication logic that granted anonymous users full access while blocking authenticated users. The app, an AI-powered EdTech tool, exposed 18,697 user records including 4,538 student accounts from institutions including UC Berkeley and UC Davis, with minors likely on the platform. Khan reported his findings through Lovable’s support channel. His ticket was closed without a response.

An earlier study in May 2025 found that 170 out of 1,645 sampled Lovable-created applications had issues allowing personal information to be accessed by anyone. Approximately 70% of Lovable apps had row-level security disabled entirely.

The structural problem

Lovable is not uniquely insecure. It is representatively insecure. The platform generates full-stack applications using React, Tailwind, and Supabase in response to natural language prompts, a process the industry calls vibe coding after Andrej Karpathy coined the term in February 2025. The approach lets anyone describe an application and have it built by an AI model without writing or reviewing code. Collins English Dictionary named it Word of the Year for 2025. Gartner forecasts that 60% of all new code will be AI-generated by the end of this year.

The security data across the entire category is consistent. Between 40 and 62% of AI-generated code contains security vulnerabilities, depending on the study. AI-written code produces flaws at 2.74 times the rate of human-written code, according to an analysis of 470 GitHub pull requests. A first-quarter 2026 assessment of more than 200 vibe-coded applications found that 91.5% contained at least one vulnerability traceable to AI hallucination. More than 60% exposed API keys or database credentials in public repositories. The vulnerability classes are the same across every major vibe coding platform: disabled row-level security, hardcoded secrets, missing webhook verification, injection flaws, and broken access controls.

Bolt.new ships with row-level security off by default. Cursor has had multiple CVEs patched, including a case-sensitivity bypass enabling persistent remote code execution. Researchers at Pillar Security demonstrated a “rules file backdoor” attack in which hackers inject hidden malicious instructions into configuration files used by Cursor and GitHub Copilot. A separate “Agent Commander” attack in March showed that prompt injection into AI coding agents could convert autonomous coding tools into remotely controlled malware delivery platforms. In January, the vibe-coded social network Moltbook was breached within three days of launch, exposing 1.5 million API authentication tokens and 35,000 email addresses through a misconfigured Supabase database with no row-level security.

The economic incentive problem

Security firms are raising money specifically to address the gap. Escape raised $18 million to replace manual penetration testing with AI agents that scan vibe-coded applications, citing over 2,000 high-impact vulnerabilities and hundreds of exposed secrets found in live production systems. Lovable itself partnered with Aikido to bring automated pentesting to its platform. But the fundamental incentive structure of the market works against security.

Lovable hit $4 million in annual recurring revenue in its first four weeks and $10 million in two months with a team of 15 people. It raised $200 million at a $1.8 billion valuation in July 2025 and $330 million at $6.6 billion in December, more than tripling its valuation in five months. Enterprise adoption of vibe coding grew 340% year over year. Non-technical user adoption surged 520%. Eighty-seven percent of Fortune 500 companies have adopted at least one vibe coding platform. The market rewards speed and accessibility. Security is a cost centre that slows both.

The result is a category in which the dominant platforms generate code that is insecure by default, the users generating that code lack the expertise to identify the vulnerabilities, and the platforms themselves have financial incentives to prioritise growth over remediation. Lovable’s handling of the March and April incidents illustrates the dynamic precisely: a bug bounty report was closed without escalation, a vulnerability affecting thousands of projects was patched for new users but not existing ones, and the public response cycled through denial, deflection, and a partial apology within a single day.

The regulatory gap

The EU AI Act’s high-risk obligations take effect on 2 August, requiring transparency, human oversight, and data governance for AI systems. California’s S.B. 53 and New York’s RAISE Act require frontier AI developers to publish safety frameworks and report incidents. But none of these regulations specifically address the security of code generated by AI models for end users, and the adoption data suggests the market is moving faster than regulators can respond. Financial services and healthcare, the two most regulated sectors, show the lowest vibe coding adoption rates at 34 and 28% respectively, which indicates that the market itself recognises the compliance gap even if regulations have not yet caught up.

As Trend Micro framed it: “The real risk of vibe coding isn’t AI writing insecure code. It’s humans shipping code they never had a chance to secure.” The 84% surge in App Store submissions driven by vibe coding tools suggests the volume of unreviewed code entering production is accelerating. Thirty-five CVEs were disclosed in March alone from AI-generated code, up from six in January, and Georgia Tech estimates the actual figure is five to ten times higher than what is detected.

Lovable is the fastest-growing software startup in history by several measures. It is also a company that closed a critical vulnerability report without reading it, left thousands of projects exposed for 48 days, and responded to public disclosure by denying a breach, blaming its documentation, blaming its bug bounty partner, and then apologising for the apology. The pattern is not unique to Lovable. It is the pattern of a category that has built extraordinary tools for creating software and almost nothing for securing it.



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Most of the time your NAS is sitting on the shelf, quietly storing whatever files you send to it. However, most NASes can do more than just back up your data, especially if they have free USB ports. These are some helpful ways you can get some extra use out of your NAS.

Use an external drive for real backups

Not all backups should live inside your NAS

It is tempting to look at your expensive NAS and think that it is all the backup solution you need. Unfortunately, it isn’t.

Proper mirroring, like you can get through RAID, can protect against a single disk failure, but it does nothing to protect you against accidental deletions, ransomware, file corruption or a catastrophic event, like a tumble off a shelf.

When all of your backups rely on a single system in one location, you’re setting yourself up for failure.

That is where your NAS’s USB port comes in. If you plug in an external drive into your NAS to create another backup, you get a true, isolated backup. Most NAS operating systems make this easy: just schedule jobs to copy important files over whenever the drive is connected.



















Quiz
8 Questions · Test Your Knowledge

Network Attached Storage (NAS)

From basement file servers to enterprise data vaults — test how much you really know about NAS technology.

HistoryHardwareUse CasesProtocolsSecurity

Which company is widely credited with introducing one of the first commercially successful NAS appliances in the early 1990s?

Correct! Auspex Systems released the NS3000 in 1989, widely regarded as one of the earliest dedicated NAS appliances. They pioneered the concept of a standalone file server accessible over a network, laying the groundwork for the modern NAS industry.

Not quite. The answer is Auspex Systems, which launched one of the first dedicated NAS appliances — the NS3000 — back in 1989. While companies like Synology and QNAP are household names today, Auspex was breaking new ground decades before them.

Which network file sharing protocol is primarily used by NAS devices to serve files to Windows-based clients?

Correct! SMB (Server Message Block) is the dominant protocol for file sharing with Windows clients. Originally developed by IBM and later popularized by Microsoft, SMB is what allows Windows machines to seamlessly browse and access NAS shares as if they were local drives.

Not quite. The answer is SMB (Server Message Block). NFS is the protocol of choice for Linux and Unix clients, iSCSI is used for block-level storage, and FTP is a general file transfer protocol not optimized for seamless file system integration.

What does the RAID level ‘5’ specifically require as a minimum number of drives to function?

Correct! RAID 5 requires a minimum of three drives. It stripes data and parity information across all drives, meaning it can tolerate the failure of one drive without any data loss — making it a popular choice for NAS users who want a balance of performance, capacity, and redundancy.

Not quite. RAID 5 requires a minimum of three drives. The parity data distributed across all drives allows one drive to fail without losing data. RAID 1 only needs two drives, while RAID 6 requires four — so options vary depending on your redundancy needs.

What is ‘media server’ functionality on a NAS most commonly used for in a home environment?

Correct! Media server functionality — often powered by software like Plex, Emby, or Jellyfin running on the NAS — allows you to stream your locally stored media collection to TVs, phones, tablets, and more. It essentially turns your NAS into a personal Netflix for your own content library.

Not quite. The core use of a NAS media server is streaming locally stored movies, music, and photos to other devices on your network. Software like Plex or Jellyfin handles the heavy lifting, including transcoding video on the fly for devices that need it.

What is the ‘3-2-1 backup rule’ that NAS users are often advised to follow?

Correct! The 3-2-1 rule means: keep 3 total copies of your data, store them on 2 different types of media (e.g., NAS and external drive), and keep 1 copy in an offsite or cloud location. This strategy protects against hardware failure, theft, fire, and other disasters that could wipe out local backups.

Not quite. The 3-2-1 rule stands for: 3 copies of your data, stored on 2 different media types, with 1 copy kept offsite. It’s a best-practice framework designed to ensure your data survives almost any disaster scenario, from a failed hard drive to a house fire.

Which protocol allows a NAS to present storage to a computer as if it were a locally attached block device, rather than a file share?

Correct! iSCSI (Internet Small Computer Systems Interface) transmits SCSI commands over IP networks, allowing a NAS to present raw block storage to a host computer. The computer then formats and manages that storage like a local disk — making iSCSI ideal for virtual machines and databases that need low-level disk access.

Not quite. The answer is iSCSI. Unlike SMB or NFS, which share files over a network, iSCSI exposes raw block storage — the host computer sees a NAS volume as though it were a physically attached hard drive, which is critical for workloads like virtual machine datastores.

Which of the following best describes a ‘surveillance station’ use case for a NAS?

Correct! Many NAS brands — including Synology and QNAP — offer dedicated surveillance station software that turns the NAS into a Network Video Recorder (NVR). It can connect to multiple IP cameras, record footage continuously or on motion detection, and store months of video locally without a subscription fee.

Not quite. A surveillance station on a NAS refers to software that connects to IP security cameras, records video footage, and stores it locally. This makes a NAS a powerful and cost-effective alternative to cloud-based security systems, since you own and control all your recorded footage.

Synology, one of the most recognized NAS brands today, was founded in which year and country?

Correct! Synology was founded in Taiwan in 2000 and has grown into one of the most beloved NAS manufacturers in the world. Their DiskStation Manager (DSM) operating system is frequently praised for its polished interface and rich feature set, making Synology a top choice for both home users and businesses.

Not quite. Synology was founded in Taiwan in 2000. Taiwan has become a major hub for NAS hardware development, with competitors like QNAP also headquartered there. Synology’s DiskStation Manager software helped set the standard for what a user-friendly NAS experience could look like.

Challenge Complete

Your Score

/ 8

Thanks for playing!

And you don’t have to stop there. You can rotate multiple drives, one drive for daily or weekly backups and another stored somewhere safe. That gives you extra protection against malware, power surges, and bad luck. It’s not fancy, but it’s one of the most important things you can do with your NAS.

The SanDisk Extreme PRO Portable SSD with USB4 and its USB-C cable.


You are completely wasting your external drive—6 brilliant jobs it should be doing instead

Stop treating your external drive like a backup dumping ground

Connect your NAS to an uninterruptible power supply

A UPS can save you from data corruption

The APC BackUPS NS1350 UPS with an old battery sitting next to it. Credit: Patrick Campanale / How-To Geek

NAS devices are built for 24/7 operation, so they’ll eventually experience a power outage or a power surge. That can be a problem for your data.

If your NAS loses power suddenly, you’re at risk of file system corruption, incomplete writes, and in a worst case scenario, total data loss.

An uninterruptible power supply keeps your NAS powered on for a short while during an outage, and if you connect them via USB, they can even exchange data. That link lets the NAS detect that power has gone out, monitor power levels, and shut itself down cleanly before the battery dies.

Without that USB connection, the NAS will just crash when the UPS finally dies.

If you’re using your NAS as a major part of your backup strategy, a small UPS that can connect over USB is definitely worthwhile.

Get a new network adapter

2.5Gb Ethernet or Wi-Fi on demand

The Plugable USB-C/A to 2.5G Ethernet adapter sitting on a bamboo table. Credit: Patrick Campanale / How-To Geek

Older or lesser NAS devices often have 1 gigabit Ethernet ports, while your drives and network could do better. Your NAS’s USB port might enable you to upgrade without replacing the whole unit.

Many NAS devices will allow you to connect a USB-to-2.5 gigabit Ethernet adapter to use instead of the built-in port. If you have SSDs, you’ll definitely be able to make use of the faster speeds offered by 2.5 gigabit Ethernet, since 1 gigabit tops out at about 125 megabytes per second. Even SATA SSDs can reach speeds of about 500 megabytes per second, and NVME SSDs can get well into the gigabyte per second range.

If you’re exclusively using mechanical hard drives, the benefit isn’t quite as clear-cut. Whether you’d benefit depends on how fast your drives are and how you have them configured.

There’s also a niche but useful option: USB Wi-Fi adapters. They’re not meant to replace Ethernet permanently, but they can be handy for temporary setups, troubleshooting network issues, or emergency access when wired connectivity fails.

You’ll need to confirm that your NAS supports USB Ethernet dongles—most do, but there are some that don’t.

Turn it into a print server

Give your old printer a new lease on life

The Ethernet port on a Brother HL-L3295CDW color laser printer. Credit: Patrick Campanale / How-To Geek

USB-only printers are largely a thing of the past, since they were tied to one computer. Most modern printers connect to the Wi-Fi network instead, so they can be placed anywhere.

If your old USB printer is still going strong, you can use your NAS as a print server.

The setup is usually quite easy, but it’ll depend on your NAS.

Many have a setting that allows you to enable print sharing. In that case, all you need to do is plug the printer into the NAS, enable print sharing, and every device on your network can use it. Alternatively, you may need to install a specific app that allows you to use your NAS as a print server.

This is especially useful if you have a reliable older printer with no built-in networking, you don’t want to replace the hardware, and you only need occasional printing without extra hassle. It may not be the most exciting use of a NAS USB port, but it’s one of the most practical.


Your NAS may be even more customizable

Depending on your specific NAS, you may be able to do even more than this. Some of them allow you to run lightweight services for your home network, like a mini home lab, and some allow you to use a completely different operating system. If that is the case, there are a ton of ways to put your NAS to use.

TerraMaster F4 SSD NAS.

8/10

CPU

Intel N95

Memory

8GB DDR5

Drive Bays

4x M.2 NVMe

Ports

5Gb/s Ethernet, USB-A, USB-C, HDMI 2.b

The TerraMaster F4 SSD is an all-SSD NAS that supports up to four 8TB NVMe drives. Shipping with 8GB of DDR5 RAM and the Intel N95 processor, this NAS actually can be user-upgraded with up to 32GB of DDR5 RAM. The onboard 5Gb/s Ethernet port supports 2.5Gb/s and 1Gb/s networking too, plus there are USB 3 10Gb/s Type-A and Type-C ports on the back for plugging in other peripherals, like hard drives or SSDs.




Source link