Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LLM Passwords Show Security Risks Due to Predictability

LLM Passwords Show Security Risks Due to Predictability

Posted on February 20, 2026 By CWS

Recent studies have highlighted significant security concerns regarding passwords generated by large language models (LLMs). Despite appearing strong at first glance, these passwords often lack true randomness, exposing them to potential exploitation.

Understanding the Flaws in LLM-Generated Passwords

Traditional secure password generation uses a cryptographically-secure pseudorandom number generator (CSPRNG), ensuring each character has an equal chance of selection. However, LLMs like GPT, Claude, and Gemini operate by predicting likely subsequent tokens, which is inherently non-random.

This difference in methodology was evident in tests where patterns emerged across multiple iterations. For instance, among 50 tests with Claude Opus 4.6, only 30 unique passwords were generated, with one repeated 18 times, indicating high predictability.

Implications of Predictable Passwords

Such predictability poses a risk for users and developers alike, as coding tools may inadvertently introduce weak passwords into software systems. This is particularly problematic in environments where code is deployed without thorough review, allowing these vulnerabilities to go unnoticed.

Additionally, specific models exhibited consistent biases. GPT-5.2 often began passwords with ‘v’, while Gemini 3 Flash showed a preference for ‘K’ or ‘k’, further emphasizing the predictability problem.

Quantifying Password Weakness

Using Shannon entropy, a measure of password strength, researchers quantified these weaknesses. Ideally, a 16-character password should have 98 bits of entropy, making it highly resistant to brute-force attacks. In contrast, Claude Opus 4.6’s passwords averaged only 27 bits of entropy, and GPT-5.2’s longer passwords were even weaker, with just 20 bits.

Adjusting model settings did not resolve these issues. Even at maximum temperature settings, repeated patterns persisted, and lowering the temperature led to identical passwords every time, underscoring the systemic nature of the problem.

Recommendations for Enhanced Security

To mitigate these risks, security experts recommend auditing and replacing any credentials generated by AI tools. Developers should utilize cryptographically secure methods such as openssl rand or /dev/random and thoroughly review AI-generated code for hardcoded passwords before deployment.

Staying informed and vigilant about these security challenges is crucial. Follow us on Google News, LinkedIn, and X for more updates on cybersecurity and related topics.

Cyber Security News Tags:AI-generated passwords, Claude, coding agents, Cybersecurity, Encryption, entropy, Gemini, GPT, LLM, password security, Predictability, security flaws, software development

Post navigation

Previous Post: FBI Alerts on $20M ATM Jackpotting Losses in 2025
Next Post: Identity Posture: A Key Factor in Cyber Insurance 2026

Related Posts

SAP June 2025 Patch Day SAP June 2025 Patch Day Cyber Security News
Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk Cyber Security News
Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials Cyber Security News
Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Cyber Security News
New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities Cyber Security News
Weaponized Malwarebytes, LastPass, Citibank, SentinelOne, and Others on GitHub Deliver Malware Weaponized Malwarebytes, LastPass, Citibank, SentinelOne, and Others on GitHub Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News