Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Google's New AI Doesn't Just Find Vulnerabilities — It Rewrites Code to Patch Them

0
Medium
Exploit
Published: Tue Oct 07 2025 (10/07/2025, 15:18:00 UTC)
Source: The Hacker News

Description

Google's DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called CodeMender that automatically detects, patches, and rewrites vulnerable code to prevent future exploits. The efforts add to the company's ongoing efforts to improve AI-powered vulnerability discovery, such as Big Sleep and OSS-Fuzz. DeepMind said the AI agent is designed to be both reactive and

AI-Powered Analysis

AILast updated: 10/09/2025, 01:07:07 UTC

Technical Analysis

Google DeepMind's CodeMender is an AI-driven agent designed to automatically detect, patch, and rewrite vulnerable code to prevent exploitation. It builds upon Google's prior AI security initiatives like Big Sleep and OSS-Fuzz, utilizing the Gemini Deep Think models to analyze codebases, identify security flaws, and generate fixes that address root causes rather than superficial symptoms. CodeMender incorporates a large language model (LLM)-based critique system that compares original and modified code to ensure patches do not introduce regressions or new bugs, enabling self-correction. Over six months of development, CodeMender has upstreamed 72 security fixes to open-source projects, some containing millions of lines of code, demonstrating scalability and effectiveness. The AI agent is designed to be both reactive—addressing newly discovered vulnerabilities—and proactive—rewriting existing codebases to eliminate entire classes of vulnerabilities. Google plans to collaborate with maintainers of critical open-source projects to refine and deploy CodeMender-generated patches. This initiative is part of a broader Secure AI Framework (SAIF) and an AI Vulnerability Reward Program (AI VRP) aimed at improving AI security and mitigating risks like prompt injections and jailbreaks. While CodeMender enhances security by automating patch creation, it also introduces considerations around trust, validation, and oversight of AI-generated code changes. No malicious exploitation or vulnerabilities related to CodeMender itself have been reported, and it is not a threat but a security enhancement tool.

Potential Impact

For European organizations, CodeMender represents a potential leap forward in software security by automating vulnerability detection and remediation, reducing the window of exposure to exploits. Organizations that maintain or rely on large open-source codebases could see improved security posture and reduced manual patching effort. However, reliance on AI-generated patches necessitates rigorous validation processes to avoid unintended side effects or regressions that could impact software integrity or availability. The technology could accelerate secure software development lifecycles and reduce operational risks associated with delayed patching. Conversely, organizations must consider governance and trust frameworks for AI-driven code changes to prevent accidental introduction of new vulnerabilities or functional issues. The proactive rewriting of existing codebases could help eliminate systemic vulnerabilities, benefiting critical infrastructure and industries with high security requirements. European software vendors and maintainers engaged in open-source projects stand to gain the most immediate benefits. The initiative aligns with EU cybersecurity goals emphasizing automation and AI to enhance resilience. However, the adoption pace and integration complexity may vary, and organizations should prepare for change management and validation challenges.

Mitigation Recommendations

European organizations should adopt a cautious but proactive approach to integrating AI-powered patching tools like CodeMender. Specific recommendations include: 1) Establish rigorous code review and validation processes for AI-generated patches, involving human experts to verify correctness and security impact before deployment. 2) Pilot CodeMender on non-critical or open-source projects to evaluate effectiveness and identify potential risks in controlled environments. 3) Develop governance policies defining roles, responsibilities, and accountability for AI-driven code changes to maintain software integrity. 4) Integrate CodeMender outputs with existing CI/CD pipelines and security testing frameworks to automate regression testing and vulnerability scanning. 5) Engage with open-source communities and maintainers to contribute feedback and improve AI patching quality and acceptance. 6) Monitor AI patching tools for potential biases, hallucinations, or unintended code modifications, and maintain fallback mechanisms to revert changes if issues arise. 7) Invest in training developers and security teams on AI-assisted development tools to maximize benefits and minimize risks. 8) Collaborate with industry groups and regulators to align AI patching practices with European cybersecurity standards and compliance requirements.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/googles-new-ai-doesnt-just-find.html","fetched":true,"fetchedAt":"2025-10-09T01:05:06.834Z","wordCount":1077}

Threat ID: 68e70a4432de7eb26af4e14d

Added to database: 10/9/2025, 1:05:08 AM

Last enriched: 10/9/2025, 1:07:07 AM

Last updated: 10/9/2025, 9:44:27 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats