Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Knowledge Vault
News16 February 20264 min read

AI Coding Flaws Allow BBC Reporter Zero-Click Hack

A BBC investigation has exposed a significant and unfixed cyber security risk in a popular AI coding platform, demonstrating how a researcher was able to hijack a reporter's laptop without any user interaction.

Mark Fermor

Mark Fermor

Director & Co-Founder, Firevault

Share
A hacked laptop screen displaying you are hacked during a BBC cyber security investigation into AI coding platform vulnerabilities

AI Coding Platform Security Flaws Exposed in BBC Investigation

A BBC investigation has revealed a significant and currently unfixed cyber security vulnerability in a popular AI coding platform known as Orchids, a so-called "vibe coding" tool that allows users without technical skills to build applications using text prompts.

The platform, which claims over one million users including staff at major companies such as Google, Uber, and Amazon, was found to contain security flaws that allowed a researcher to execute a zero-click attack on a BBC reporter's laptop.

The Attack Demonstrated

Cyber security researcher Etizaz Mohsin demonstrated the vulnerability to the BBC by exploiting a weakness in the platform. After the reporter began a coding project using Orchids, Mohsin was able to gain access to the project, view and edit code, and ultimately gain control of the reporter's machine.

The researcher inserted a small line of code into the thousands of lines generated by the AI, which allowed him to access the computer. A notepad file appeared on the desktop, and the wallpaper was changed to confirm the breach.

The implications are stark. A malicious actor could have installed a virus, stolen private or financial data, accessed internet history, or even activated cameras and microphones, all without any action required from the victim.

A New Class of Vulnerability

"The vibe coding revolution has introduced a fundamental shift in how developers interact with their tools, and this shift has created an entirely new class of security vulnerability that did not exist before," Mohsin explained. "The whole proposition of having the AI handle things for you comes with big risks."

Mohsin, who has a track record of uncovering dangerous software flaws including work on the Pegasus spyware, said he discovered the vulnerability in December 2025. Despite sending around a dozen messages across email, LinkedIn, and Discord, the Orchids team only responded this week, stating they "possibly missed" his warnings as they were "overwhelmed with inbound" messages.

Expert Warnings

Professor Kevin Curran of Ulster University noted: "The main security implications of vibe coding are that without discipline, documentation, and review, such code often fails under attack."

Karolis Arbaciauskas, head of product at NordPass, advised caution: "While it is exciting and curious to see what an AI agent can do without any security guardrails, this level of access is also extremely insecure." He recommends running such tools on separate, dedicated machines with disposable accounts.

How Firevault Would Have Protected These Users

This incident highlights precisely the type of threat that Firevault's offline secure storage architecture is designed to neutralise. Here is how each product directly addresses the risks exposed in this attack:

Firevault Vault would have ensured that any sensitive personal files, credentials, financial records, or private documents stored on the reporter's machine were instead held in a physically disconnected, air-gapped environment. Even with full remote access to the laptop, an attacker would find nothing of value to steal, because the data simply would not be there. The Vault is offline by default, meaning there is no network path for an attacker to traverse.

Firevault Storage provides the same Layer 1 physical air gap protection for businesses and development teams. Source code repositories, API keys, client data, and intellectual property stored in Firevault Storage would have been entirely unreachable during this zero-click attack. The out-of-band control plane, which uses no IP address, no network connection, and no admin interface, means that even if a development environment is fully compromised, the attacker cannot reach, discover, or manipulate data held in a Firevault Bunker.

The Firevault Platform ties these protections together with identity-verified access, hardware encryption, and the Butterfly enterprise methodology. Data is only accessible during explicitly authorised sessions, and the system returns to its default offline state the moment a session ends.

The core lesson is clear: you cannot breach what is not connected. While the industry debates how to secure AI-driven development tools, Firevault removes the attack surface entirely.

Source: BBC News

Published by Mark Fermor, Director and Co-Founder, Firevault

About the author

Mark Fermor

Mark Fermor

Director & Co-Founder

The driving force behind Firevault's market presence, combining commercial vision with deep tech insight.

Share this article

News16 February 20264 min read

AI Coding Flaws Allow BBC Reporter Zero-Click Hack

A BBC investigation has exposed a significant and unfixed cyber security risk in a popular AI coding platform, demonstrating how a researcher was able to hijack a reporter's laptop without any user interaction.

AI Coding Flaws Allow BBC Reporter Zero-Click Hack
Mark Fermor
Published by Mark Fermor, Director & Co-Founder

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy