bug-bounty407
google401
xss352
microsoft314
facebook284
exploit191
apple187
rce176
malware145
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain57
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
smart-contract45
reverse-engineering45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
buffer-overflow31
auth-bypass30
wordpress29
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
7/10
Security researchers from Irregular found that LLM-generated passwords from Claude, ChatGPT, and Gemini are fundamentally weak due to predictable patterns, with entropy around 27-20 bits instead of the 98-120 bits expected from truly random passwords. This allows passwords to be brute-forced in hours rather than centuries, despite appearing strong to standard password checkers.
password-generation
llm-security
entropy-analysis
ai-vulnerability
brute-force
cryptography
claude
chatgpt
gemini
research
Irregular
Claude
ChatGPT
Gemini
OpenAI
Google
Anthropic
Dario Amodei
HackerOne
1Password
Bitwarden
GitHub