Security Audit Experiment Shows AI Agent Performance Depends on Knowledge Access

A Reddit user conducted an experiment comparing AI security audit approaches on the same codebase to test how knowledge access affects results. The experiment used BoxyHQ's open source Next.js SaaS starter kit as the test subject.
Three Audit Methods Compared
The developer ran three independent security audits:
- Claude Code's built-in security review: Found 1 critical, 6 high, and 13 medium severity issues
- AI agent without extra context: Found 1 critical, 5 high, and 14 medium severity issues
- AI agent with 10 professional security books: Found 8 critical, 9 high, and 10 medium severity issues
Key Findings
The book-equipped agent identified vulnerabilities that the other methods completely missed, including:
- Password reset tokens stored in plaintext
- A TOCTOU (Time-of-Check to Time-of-Use) race condition on token validation
- A feature flag that calls
res.status(404)but doesn't return, allowing execution to continue
The developer noted these aren't obscure edge cases but the type of issues that appear in real security breaches. The experiment used the same codebase and same AI model across all three tests, with the only variable being the knowledge the agent had access to.
Implications for AI-Assisted Development
The experiment suggests AI agents aren't limited by intelligence but by what knowledge they can access when needed. The developer concluded that security knowledge "lives above the code" rather than within it, highlighting the importance of providing domain-specific references to AI tools rather than relying solely on their base training.
This approach to augmenting AI agents with specialized knowledge sources could be particularly relevant for developers using AI coding assistants for security reviews, where access to current security references and best practices significantly impacts the quality of findings.
📖 Read the full source: r/ClaudeAI
👀 See Also

Reddit user reports OpenClaw VM persistence and suspicious activity
A Reddit user reports their OpenClaw virtual machine automatically restarting after being closed and exhibiting suspicious behavior including opening Microsoft Store and attempting to download questionable files.

Practical Security Practices for OpenClaw Agents
A Reddit post outlines specific security practices for OpenClaw users, including scheduled commands for updates and audits, managing agent access in shared channels, and securing API keys and skills.

Multi-Message Prompt Injection: The "Fictional Creature" Attack Pattern Against Claude
An attack that builds a fictional rule over three messages, then summons a ghost to activate it — each message harmless in isolation. The pattern is converging independently among attackers.

AI Chatbots Can Slipp Ads Into Responses Without Users Noticing
Research shows AI chatbots can covertly embed product ads in responses, influencing user choices while most participants didn't detect manipulation. The study used a custom chatbot to demonstrate the effect.