Google's New AI Doesn't Just Find Vulnerabilities — It Rewrites Code to Patch Them
Google's DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called CodeMender that automatically detects, patches, and rewrites vulnerable code to prevent future exploits. The efforts add to the company's ongoing efforts to improve AI-powered vulnerability discovery, such as Big Sleep and OSS-Fuzz. DeepMind said the AI agent is designed to be both reactive and
AI Analysis
Technical Summary
Google DeepMind's CodeMender is an AI-driven agent designed to automatically detect, patch, and rewrite vulnerable code to prevent exploitation. It builds upon Google's prior AI security initiatives like Big Sleep and OSS-Fuzz, utilizing the Gemini Deep Think models to analyze codebases, identify security flaws, and generate fixes that address root causes rather than superficial symptoms. CodeMender incorporates a large language model (LLM)-based critique system that compares original and modified code to ensure patches do not introduce regressions or new bugs, enabling self-correction. Over six months of development, CodeMender has upstreamed 72 security fixes to open-source projects, some containing millions of lines of code, demonstrating scalability and effectiveness. The AI agent is designed to be both reactive—addressing newly discovered vulnerabilities—and proactive—rewriting existing codebases to eliminate entire classes of vulnerabilities. Google plans to collaborate with maintainers of critical open-source projects to refine and deploy CodeMender-generated patches. This initiative is part of a broader Secure AI Framework (SAIF) and an AI Vulnerability Reward Program (AI VRP) aimed at improving AI security and mitigating risks like prompt injections and jailbreaks. While CodeMender enhances security by automating patch creation, it also introduces considerations around trust, validation, and oversight of AI-generated code changes. No malicious exploitation or vulnerabilities related to CodeMender itself have been reported, and it is not a threat but a security enhancement tool.
Potential Impact
For European organizations, CodeMender represents a potential leap forward in software security by automating vulnerability detection and remediation, reducing the window of exposure to exploits. Organizations that maintain or rely on large open-source codebases could see improved security posture and reduced manual patching effort. However, reliance on AI-generated patches necessitates rigorous validation processes to avoid unintended side effects or regressions that could impact software integrity or availability. The technology could accelerate secure software development lifecycles and reduce operational risks associated with delayed patching. Conversely, organizations must consider governance and trust frameworks for AI-driven code changes to prevent accidental introduction of new vulnerabilities or functional issues. The proactive rewriting of existing codebases could help eliminate systemic vulnerabilities, benefiting critical infrastructure and industries with high security requirements. European software vendors and maintainers engaged in open-source projects stand to gain the most immediate benefits. The initiative aligns with EU cybersecurity goals emphasizing automation and AI to enhance resilience. However, the adoption pace and integration complexity may vary, and organizations should prepare for change management and validation challenges.
Mitigation Recommendations
European organizations should adopt a cautious but proactive approach to integrating AI-powered patching tools like CodeMender. Specific recommendations include: 1) Establish rigorous code review and validation processes for AI-generated patches, involving human experts to verify correctness and security impact before deployment. 2) Pilot CodeMender on non-critical or open-source projects to evaluate effectiveness and identify potential risks in controlled environments. 3) Develop governance policies defining roles, responsibilities, and accountability for AI-driven code changes to maintain software integrity. 4) Integrate CodeMender outputs with existing CI/CD pipelines and security testing frameworks to automate regression testing and vulnerability scanning. 5) Engage with open-source communities and maintainers to contribute feedback and improve AI patching quality and acceptance. 6) Monitor AI patching tools for potential biases, hallucinations, or unintended code modifications, and maintain fallback mechanisms to revert changes if issues arise. 7) Invest in training developers and security teams on AI-assisted development tools to maximize benefits and minimize risks. 8) Collaborate with industry groups and regulators to align AI patching practices with European cybersecurity standards and compliance requirements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
Google's New AI Doesn't Just Find Vulnerabilities — It Rewrites Code to Patch Them
Description
Google's DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called CodeMender that automatically detects, patches, and rewrites vulnerable code to prevent future exploits. The efforts add to the company's ongoing efforts to improve AI-powered vulnerability discovery, such as Big Sleep and OSS-Fuzz. DeepMind said the AI agent is designed to be both reactive and
AI-Powered Analysis
Technical Analysis
Google DeepMind's CodeMender is an AI-driven agent designed to automatically detect, patch, and rewrite vulnerable code to prevent exploitation. It builds upon Google's prior AI security initiatives like Big Sleep and OSS-Fuzz, utilizing the Gemini Deep Think models to analyze codebases, identify security flaws, and generate fixes that address root causes rather than superficial symptoms. CodeMender incorporates a large language model (LLM)-based critique system that compares original and modified code to ensure patches do not introduce regressions or new bugs, enabling self-correction. Over six months of development, CodeMender has upstreamed 72 security fixes to open-source projects, some containing millions of lines of code, demonstrating scalability and effectiveness. The AI agent is designed to be both reactive—addressing newly discovered vulnerabilities—and proactive—rewriting existing codebases to eliminate entire classes of vulnerabilities. Google plans to collaborate with maintainers of critical open-source projects to refine and deploy CodeMender-generated patches. This initiative is part of a broader Secure AI Framework (SAIF) and an AI Vulnerability Reward Program (AI VRP) aimed at improving AI security and mitigating risks like prompt injections and jailbreaks. While CodeMender enhances security by automating patch creation, it also introduces considerations around trust, validation, and oversight of AI-generated code changes. No malicious exploitation or vulnerabilities related to CodeMender itself have been reported, and it is not a threat but a security enhancement tool.
Potential Impact
For European organizations, CodeMender represents a potential leap forward in software security by automating vulnerability detection and remediation, reducing the window of exposure to exploits. Organizations that maintain or rely on large open-source codebases could see improved security posture and reduced manual patching effort. However, reliance on AI-generated patches necessitates rigorous validation processes to avoid unintended side effects or regressions that could impact software integrity or availability. The technology could accelerate secure software development lifecycles and reduce operational risks associated with delayed patching. Conversely, organizations must consider governance and trust frameworks for AI-driven code changes to prevent accidental introduction of new vulnerabilities or functional issues. The proactive rewriting of existing codebases could help eliminate systemic vulnerabilities, benefiting critical infrastructure and industries with high security requirements. European software vendors and maintainers engaged in open-source projects stand to gain the most immediate benefits. The initiative aligns with EU cybersecurity goals emphasizing automation and AI to enhance resilience. However, the adoption pace and integration complexity may vary, and organizations should prepare for change management and validation challenges.
Mitigation Recommendations
European organizations should adopt a cautious but proactive approach to integrating AI-powered patching tools like CodeMender. Specific recommendations include: 1) Establish rigorous code review and validation processes for AI-generated patches, involving human experts to verify correctness and security impact before deployment. 2) Pilot CodeMender on non-critical or open-source projects to evaluate effectiveness and identify potential risks in controlled environments. 3) Develop governance policies defining roles, responsibilities, and accountability for AI-driven code changes to maintain software integrity. 4) Integrate CodeMender outputs with existing CI/CD pipelines and security testing frameworks to automate regression testing and vulnerability scanning. 5) Engage with open-source communities and maintainers to contribute feedback and improve AI patching quality and acceptance. 6) Monitor AI patching tools for potential biases, hallucinations, or unintended code modifications, and maintain fallback mechanisms to revert changes if issues arise. 7) Invest in training developers and security teams on AI-assisted development tools to maximize benefits and minimize risks. 8) Collaborate with industry groups and regulators to align AI patching practices with European cybersecurity standards and compliance requirements.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/googles-new-ai-doesnt-just-find.html","fetched":true,"fetchedAt":"2025-10-09T01:05:06.834Z","wordCount":1077}
Threat ID: 68e70a4432de7eb26af4e14d
Added to database: 10/9/2025, 1:05:08 AM
Last enriched: 10/9/2025, 1:07:07 AM
Last updated: 10/9/2025, 9:44:27 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities
MediumExploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
MediumFortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks
MediumThe Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn
MediumUnauthenticated RCE Flaw Patched in DrayTek Routers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.