All posts

Shadow AI Is the New S3 Crisis. Here's How to Build Without Adding to the Mess

Security researchers found 380,000 public assets built with vibe coding tools, many leaking live data. Builders need fast workflows that don't skip governance entirely

May 9, 20263 min read
Raw punk-zine style illustration of a heavy black assembly line producing app blocks while dense streams of data leak from broken containers, suggesting shadow AI and exposed live}

Israeli security firm RedAccess scanned the public web and found something that should sober up every AI enthusiast. 380,000 publicly accessible assets built with vibe coding tools sat exposed, many wired directly to live databases. Google indexed customer intake forms, internal dashboards, and data collection apps built on Lovable, Base44, and Replit over weekends, leaving them wide open. This is shadow AI, and it is quickly becoming the new S3 bucket crisis.

The numbers are staggering. Researchers identified roughly five thousand applications and their associated infrastructure built by AI-assisted tools that prioritize speed over safety. A product manager with a credit card and an idea can now spin up a working form, connect it to Supabase, and share the URL in a Slack channel before lunch. Nobody reviewed the code. Nobody checked the database permissions. The app was never meant to last, but it is still collecting real customer data.

Why Vibe Coding Turns Into Shadow IT

The problem is not that non-engineers are building software. That is genuinely exciting. The problem is that the current generation of vibe coding platforms treats deployment as a party trick rather than a responsibility. One-click publish feels magical until you realize the database connection string sits exposed in client-side JavaScript or that authentication got skipped because the agent deemed it nonessential. By the time a security auditor discovers the app, it has already ingested leads, personal information, or payment details.

We have seen this movie before. In the mid-2010s, developers spun up AWS S3 buckets to store files and forgot to toggle the private setting. Sensitive data leaked for years because the tools made storage trivial but governance invisible. Shadow AI follows the same arc. The difference now is that the builders are not engineers. They are marketers, operations leads, and founders who were promised they could skip the hard parts. They believed the hype, and now CISOs must hunt down public URLs that should never have existed.

Fast and Safe Are Not Opposites

The reaction from enterprise security will be predictable. More red tape. More procurement checks. More attempts to ban vibe coding altogether. That would be a mistake, because the underlying demand is real. People need to ship software quickly. What they need is a path that does not treat security as an afterthought. Builders deserve tools that generate production-ready code on solid infrastructure with audit trails from day one.

This is exactly why Botflow ships every project to your own GitHub repository automatically. The code is yours. You can read it, review it, and run it through the same static analysis tools your security team already trusts. There is no black box, no hidden connection string buried in a generated artifact you cannot inspect. Because Botflow is fully open source, you can see how the sausage is made. That transparency matters when you are handling actual user data.

The backend stack also changes the stakes. Botflow runs on Convex, a reactive database and serverless backend built for production workloads. It includes authentication patterns, durable workflows, and built-in vector search that do not require you to duct-tape third-party services together. You are not dropping a live Supabase URL into a generated frontend and hoping nobody finds it. You are deploying to Cloudflare with proper separation between client and server, exactly the kind of architecture that passes a real security review.

The Builders Who Win Will Ship Responsibly

Shadow AI will not disappear. The productivity gains are too large to stuff back into the bottle. But the builders who separate themselves from the pack will be the ones who treat AI-generated code with the same discipline they would apply to hand-written software. They will use branches, run tests, and deploy through pipelines rather than pressing a mystery button that promises instant publication. They will recognize that a weekend prototype and a production application are different animals.

The market is already rewarding this discipline. Cloudflare just posted record revenue even after AI made over a thousand support roles obsolete. Customers are paying for infrastructure they can trust, not for clever hacks that become tomorrow's breach headline. If you are building with AI right now, you have a choice. You can add to the growing pile of exposed assets that security researchers are cataloging, or you can ship something that scales without embarrassing your users. The tooling exists. Use it.