July 21, 2025

You Built it with AI… Now What? The Risk You Didn’t See Coming

By Brad Gardner, Founder & CTO

The rise of AI-assisted coding tools has opened the door for many creative minds, including those without formal technical backgrounds, to build impressive software products. And while that kind of accessibility is exciting, it comes with serious risks. Behind the hype, many are learning the hard way that just because software works doesn't mean it's safe.

A Cautionary Tale: A Developer Under Attack

A developer @leojr94_ shared their story on X, describing how their SaaS product came under attack after they publicly shared how they built it using Cursor.

This highlights a critical point. Building and deploying software is not just about getting it to work. It’s about securing it, ensuring it can handle malicious behavior, and protecting your data and your users. Without an understanding of these risks, and without building the right defenses into your code and infrastructure, even a small app can become a liability.

Who’s code is it anyway?

A recent post from Kaspersky details an even more alarming incident. A popular open-source package for Cursor AI was found to include a malicious payload that turned unsuspecting users’ machines into crypto-miners.

This incident underscores another reality of modern software development. Trusting third-party code blindly is dangerous. Many developers, especially those learning via AI tools, do not yet know how to audit dependencies or recognize suspicious behavior in libraries. This lack of knowledge can open the door for attackers to piggyback on your work.

When Poor Security Meets AI at Scale: McDonald’s AI Hiring Breach

A particularly striking example of these risks at scale came from McDonald’s AI-powered hiring tool.

McDonald’s vendor deployed an AI-driven system to process job applications. But due to embarrassingly poor security — including a database secured with the password 123456 — the personal information of 64 million applicants was exposed.

This example combines many of the themes discussed:

  • Using AI to automate a complex process.
  • Developers or vendors failing to apply even the most basic security controls.
  • Lack of proper oversight and understanding of what their tools were doing behind the scenes.

It also illustrates that even at a giant, well-funded company, these mistakes can happen if developers and decision-makers do not truly understand the technology they are deploying or the risks it creates.

Beyond the Code: Why Knowledge Still Matters

Here’s the uncomfortable truth:

Even if an AI can write functional code, you still need to understand how that code works to ensure it is reliable, performant, and secure.

Non-technical builders and even some junior developers often lack the foundational knowledge to recognize when code, even if it runs, is dangerous. AI models are trained on both good and bad code. They can just as easily produce something with critical vulnerabilities as they can something robust.

Here are some key areas of risk:

Insecure Authentication & Authorization

Many apps built by beginners misunderstand or mis-implement authentication and authorization.

  • How does OAuth 2.0 really work?
  • What type of MFA should you support?
  • How should you store JWTs?

Without understanding these basics, you risk exposing user data or allowing attackers to hijack sessions.

Injection Flaws

SQL injection and command injection are still among the most common and dangerous vulnerabilities.

  • Do you know how to properly use parameterized queries?
  • Are you validating and sanitizing user inputs?
  • Are you escaping output where needed?

AI code suggestions may include unsafe patterns if you don’t know how to spot them.

XSS & CSRF

Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF or XSRF) attacks remain a real threat:

  • Do you know when to use Content-Security-Policy headers?
  • How to properly escape dynamic content in templates?
  • Why you should include anti-forgery tokens in forms?

AI won’t magically protect you from these unless you explicitly tell it to, and even then, you may not know if it did it correctly.

Data Validation and Sanitization

Many attacks exploit weak or missing input validation.

  • Are you validating data on both client and server?
  • Are you checking against a whitelist instead of a blacklist?

Blindly trusting input, or blindly trusting AI-generated validation code, is a recipe for disaster.

AI Is Not a Silver Bullet

Because AI is trained on a mix of good and bad examples, you cannot assume that what it produces is correct, optimal, or secure.
Even if it “works” and passes your tests, that doesn’t mean:

  • It can handle malicious input.
  • It follows best practices.
  • It performs well under load.
  • It scales gracefully.

Without the ability to read and understand what the AI gave you, you are shipping code you do not actually control. Attackers know how to exploit that.

Who’s Responsible? The Accountability & Liability Risk

One of the most overlooked dangers of using AI to build software you don’t fully understand is the accountability risk.

When you deploy something into production, whether it is a SaaS app, an internal tool, a machine learning model, or even just a public-facing website, you become responsible for the consequences of its behavior.

It does not matter if the code was written by you, by an AI, or copied from Stack Overflow.

If it runs on your infrastructure, under your name, and affects your users, you are accountable for what it does.

Legal and Regulatory Consequences

  • If you leak customer data because you failed to secure your database or validate inputs properly, you can be held liable under privacy laws like GDPR, CCPA, or HIPAA.
  • If your app facilitates fraud or allows unauthorized access, you or your company could face lawsuits and regulatory fines.
  • If you build on third-party libraries without respecting their licenses, you may incur legal or financial penalties.

Reputational Damage

Even if you’re not sued, your reputation may be damaged. Users (and investors) have little sympathy for breaches caused by “we didn’t know” or “the AI generated it.”

You Can’t Audit What You Don’t Understand

If you don’t know how to read the code you ship, you can’t properly:

  • Audit it for vulnerabilities.
  • Test it against abuse scenarios.
  • Explain how it works to regulators, partners, or users.

When something goes wrong, and in production, it will, you’ll have no ability to diagnose or defend your decisions.

How to Protect Yourself (Even If You’re Not a Developer)

You don’t need to be a security expert to take meaningful precautions. Here are a few ways to reduce your risk, even if you’re just starting out or relying heavily on AI tools:

  • Use hosted solutions when possible. Platforms like Firebase, Supabase, and Auth0 have built-in security features that reduce risk for early-stage builders.
  • Rotate your API keys regularly. Treat them like passwords — if they get exposed, revoke and replace them.
  • Don’t share too much about your stack. Posting screenshots or code samples online can invite bad actors.
  • Ask for a code or architecture review. A second set of experienced eyes can catch things AI or junior devs might miss.
  • Push back on speed-at-all-costs culture. Security shortcuts now often turn into cleanup disasters later.

These steps won’t make your app bulletproof, but they can buy you time, reduce your exposure, and help you build more confidently.

The Bottom Line

If you’re a non-technical founder, solo builder, or a developer new to the field:

  • Don’t blindly trust AI output — treat it as a suggestion, not gospel.
  • Learn the basics of security best practices for web development.
  • Use trusted libraries and keep them up to date.
  • Audit your dependencies and avoid unnecessary ones.
  • Bring in experienced engineers to review your architecture and code before launch.

If you don’t know how something works, you won’t know if it’s broken, and neither will your AI.

Building software is about more than making something run; it’s about making it run safely.

As developers, it’s our responsibility to encourage people to build amazing software, but also to understand what they are building.

Frequently Asked Questions

No items found.

Latest Posts

We’ve helped our partners to digitally transform their organizations by putting people first at every turn.

2/7/2025
Writing Testable Front-End Code - Best Practices, Patterns, and Pitfalls (Pt 2)

Continuing our guide to testable front-end code with advanced patterns, real-world examples, and the traps that even experienced devs miss.

27/6/2025
Writing Testable Front-End Code - Best Practices, Patterns, and Pitfalls (Pt 1)

A practical guide to writing testable front-end code, mocking strategies, and applying best practices to ensure your codebase stays clean, maintainable, and covered.

23/6/2025
Can You Trust Your MCP Server?

Think your MCP server is safe? One poisoned tool could quietly turn it into a data-leaking backdoor.

20/6/2025
Why Fractional AI Leadership Might Be The Smartest Move Your Business Can Make

Most companies don’t need a full-time AI exec—they need smart, fractional leadership that aligns AI with real business goals.

2/6/2025
Cracking the Code: Fixing Memory Leaks and File Corruption in React Native GCP Uploads

Struggling with large file uploads in React Native? We hit memory leaks and corrupted files over 2GB—then fixed it by building native modules. Here’s how.

16/5/2025
From Coders to Conductors: How AI is Helping Us Build Smarter, Faster, and Better Software

How AI Is Changing the Way We Build Software: Our developers are using AI tools like GitHub Copilot to move faster and smarter—shifting from manual coding to strategic prompting and editing. Learn how this evolving approach is helping us deliver high-quality software in less time.

13/5/2025
Why Government Tech Falls Short, And What We Can Do About It

The RFP process is broken. Here's how public sector teams can get better outcomes by partnering earlier, focusing on users, and rethinking how government tech gets built.

6/1/2025
Growing Junior Developers in Remote and AI-Enabled Environments

Nurturing junior developers in today’s remote and AI-driven workplace is essential for long-term success, yet it comes with unique challenges. This article explores practical strategies to help junior talent thrive.

2/12/2024
The Power of Discovery: Ensuring Software Project Success

Effective discovery is crucial in software development to prevent budget overruns and project delays. By conducting discovery sprints and trial projects, businesses can align goals, define scope, and mitigate risks, ensuring successful outcomes.

29/1/2023
Native vs. React Native For Mobile App Development

In this article, we address the advantages and disadvantages of native apps and compare them to those of React Native apps. We will then propose one example of a ‘good fit’ native app and a ‘good fit’ React Native app. The article concludes with a general recommendation for when you should build your application natively and when to do so in React Native.

15/1/2021
Azure Security Best Practices

Adoption of cloud services like Microsoft Azure is accelerating year over year. Around half of all workloads and data are already in a public cloud, with small businesses expanding rapidly and expecting up to 70% of their systems to be in a public cloud within the next 12 months. Are you sure your data is secure?

19/10/2020
High Cohesion, Low Coupling

In this short article I would like to show you one example of High Cohesion and Low Coupling regarding Software Development. Imagine that you have a REST API that have to manage Users, Posts and Private Message between users. One way of doing it would be like the following example: As you can see, the […]

6/12/2019
How to Find a Software Development Company

You’ve identified the need for new software for your organization. You want it built and maintained but don’t have the knowledge, time, or ability to hire and manage a software staff. So how do you go about finding a software development company for your project? Step 1: Search for Existing Software The first step in […]

19/11/2019
3 Common Problems with Custom Software Development

Custom software is a great way to increase efficiency and revenue for your organization. However, creating custom software means more risk for you. Here are a few common problems to avoid when building your next mobile or web app. 1. Cost Overrun One of the biggest challenges of custom software development is gathering requirements. The process […]

3/11/2019
Staff Augmentation vs. Project-based Consulting

So, you want to build some software. But where do you start? Maybe you’re not ready to take on the large task of hiring a team internally. Of all the options out there for building your software, two of the most common are staff augmentation and project-based consulting. So what’s best for you, staff augmentation […]

28/10/2019
Agile Isn’t the Problem

Failed implementing agile in your organization? Agile isn't the problem.

10/9/2019
Should you hire software developers?

Are you ready to hire software developers? It might be worth more investigation.

29/8/2019
How long does a project take?

Breaking down how we work and what goes into each project.

19/8/2019
Observability of Systems

Solve your next production issue with less headache and better insight.

28/6/2019
Web vs Mobile: What’s Right for You?

How to use empathy to drive decisions around the platform for your future application.

17/6/2019
5 Tricks To Help Developers with Design

Developers tend to struggle with design, but there are a few quick changes that can make your software shine.

29/10/2018
Why should you use a G Suite Resller?

As of February 2018, Google had 4 million businesses using G Suite for email and file storage, collaborating on documents, video conferencing and more.