bug-bounty408
google401
xss352
microsoft316
facebook286
exploit192
apple187
rce176
malware148
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain58
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
reverse-engineering46
smart-contract45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
auth-bypass31
buffer-overflow31
wordpress30
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
7/10
Security researchers from Irregular found that LLM-generated passwords from Claude, ChatGPT, and Gemini are fundamentally weak due to predictable patterns, with entropy around 27-20 bits instead of the 98-120 bits expected from truly random passwords. This allows passwords to be brute-forced in hours rather than centuries, despite appearing strong to standard password checkers.
password-generation
llm-security
entropy-analysis
ai-vulnerability
brute-force
cryptography
claude
chatgpt
gemini
research
Irregular
Claude
ChatGPT
Gemini
OpenAI
Google
Anthropic
Dario Amodei
HackerOne
1Password
Bitwarden
GitHub