Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GPT-5 Agent That Finds and Fixes Code Flaws Automatically

GPT-5 Agent That Finds and Fixes Code Flaws Automatically

Posted on October 31, 2025October 31, 2025 By CWS

Oct 31, 2025Ravie LakshmananArtificial Intelligence / Code Safety
OpenAI has introduced the launch of an “agentic safety researcher” that is powered by its GPT-5 massive language mannequin (LLM) and is programmed to emulate a human professional able to scanning, understanding, and patching code.
Known as Aardvark, the bogus intelligence (AI) firm mentioned the autonomous agent is designed to assist builders and safety groups flag and repair safety vulnerabilities at scale. It is at the moment accessible in non-public beta.
“Aardvark repeatedly analyzes supply code repositories to determine vulnerabilities, assess exploitability, prioritize severity, and suggest focused patches,” OpenAI famous.
It really works by embedding itself into the software program improvement pipeline, monitoring commits and modifications to codebases, detecting safety points and the way they is perhaps exploited, and proposing fixes to deal with them utilizing LLM-based reasoning and tool-use.

Powering the agent is GPT‑5, which OpenAI launched in August 2025. The corporate describes it as a “sensible, environment friendly mannequin” that options deeper reasoning capabilities, courtesy of GPT‑5 pondering, and a “actual‑time router” to determine the best mannequin to make use of based mostly on dialog kind, complexity, and person intent.
Aardvark, OpenAI added, analyses a venture’s codebase to supply a risk mannequin that it thinks finest represents its safety targets and design. With this contextual basis, the agent then scans its historical past to determine present points, in addition to detect new ones by scrutinizing incoming modifications to the repository.
As soon as a possible safety defect is discovered, it makes an attempt to set off it in an remoted, sandboxed surroundings to substantiate its exploitability and leverages OpenAI Codex, its coding agent, to supply a patch that may be reviewed by a human analyst.
OpenAI mentioned it has been operating the agent throughout OpenAI’s inside codebases and a few of its exterior alpha companions, and that it has helped determine a minimum of 10 CVEs in open-source initiatives.
The AI upstart is much from the one firm to trial AI brokers to sort out automated vulnerability discovery and patching. Earlier this month, Google introduced CodeMender that it mentioned detects, patches, and rewrites susceptible code to forestall future exploits. The tech large additionally famous that it intends to work with maintainers of important open-source initiatives to combine CodeMender-generated patches to assist hold initiatives safe.

Seen in that gentle, Aardvark, CodeMender, and XBOW are being positioned as instruments for steady code evaluation, exploit validation, and patch technology. It additionally comes shut on the heels of OpenAI’s launch of the gpt-oss-safeguard fashions which might be fine-tuned for security classification duties.
“Aardvark represents a brand new defender-first mannequin: an agentic safety researcher that companions with groups by delivering steady safety as code evolves,” OpenAI mentioned. “By catching vulnerabilities early, validating real-world exploitability, and providing clear fixes, Aardvark can strengthen safety with out slowing innovation. We consider in increasing entry to safety experience.”

The Hacker News Tags:Agent, Automatically, Code, Finds, Fixes, Flaws, GPT5

Post navigation

Previous Post: Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
Next Post: Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data

Related Posts

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys The Hacker News
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025 Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More The Hacker News
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution The Hacker News
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications New TETRA Radio Encryption Flaws Expose Law Enforcement Communications The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News