Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code.

Saved in:
Bibliographic Details
Title: Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code.
Authors: Alrashedy, Kamel, Aljasser, Abdullah, Tambwekar, Pradyumna, Gombolay, Matthew
Source: Journal of Cybersecurity & Privacy; Dec2025, Vol. 5 Issue 4, p110, 29p
Subject Terms: COMPUTER security vulnerabilities, LANGUAGE models, PROGRAM transformation, BENCHMARK problems (Computer science), SOFTWARE maintenance, SOURCE code
Abstract: Large language models (LLMs) have shown remarkable potential for automatic code generation. Yet, these models share a weakness with their human counterparts: inadvertently generating code with security vulnerabilities that could allow unauthorized attackers to access sensitive data or systems. In this work, we propose Feedback-Driven Security Patching (FDSP), wherein LLMs automatically refine vulnerable generated code. The key to our approach is a unique framework that leverages automatic static code analysis to enable the LLM to create and implement potential solutions to code vulnerabilities. Further, we curate a novel benchmark, PythonSecurityEval, that can accelerate progress in the field of code generation by covering diverse, real-world applications, including databases, websites, and operating systems. Our proposed FDSP approach achieves the strongest improvements, reducing vulnerabilities by up to 33% when evaluated with Bandit and 12% with CodeQL and outperforming baseline refinement methods. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Cybersecurity & Privacy is the property of MDPI and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Be the first to leave a comment!
You must be logged in first