Bug bounty programmes have been a cornerstone of modern security for over a decade. Responsible disclosure, financial incentives for researchers, and a structured pipeline from discovery to remediation — it worked. Until AI broke the economics.
In early 2026, a cascade of events made it clear that AI-assisted vulnerability research has crossed a threshold. HackerOne suspended new submissions to its Internet Bug Bounty programme. The cURL project eliminated monetary rewards entirely. The Linux kernel security mailing list became, in Linus Torvalds’s words, “almost entirely unmanageable.” And GitHub tightened its submission criteria after being “inundated by submissions that fail to demonstrate any real security impact.”
This is not a niche security-community problem. It is an early warning for every team that ships software.
TL;DR
- HackerOne paused its Internet Bug Bounty programme in March 2026 after a 76% year-over-year jump in submissions, many AI-generated and low quality
- The cURL project dropped bounty rewards and saw report quality improve immediately — proving financial incentives attract AI slop
- Open source maintainers are losing hours disproving hallucinated vulnerabilities, draining volunteer capacity from actual development
- Development teams should treat this as a signal: AI is accelerating both legitimate security research and noise, and your processes need to adapt
- Practical steps include tightening acceptance criteria for internal vulnerability reports, investing in automated triage, and supporting the open source projects you depend on
What Actually Happened
The numbers tell the story. HackerOne reported a 76% jump in submissions year-over-year through March 2026. The share of reports flagging genuine vulnerabilities held steady at roughly 25% — meaning three-quarters of submissions were noise, and the absolute volume of that noise nearly doubled.
For large platform companies with dedicated security teams, this is an annoyance. For open source maintainers — volunteers who already juggle day jobs, community management, and code review — it is devastating.
Daniel Stenberg, the creator and lead maintainer of cURL, took the most drastic step: he removed all monetary rewards from cURL’s bug bounty programme. The result was immediate and telling. “The slop situation is not a problem anymore,” Stenberg reported. Report quality improved, and confirmed vulnerabilities actually surpassed 2024 pre-AI levels. The lesson? Financial incentives, when combined with AI’s ability to generate plausible-sounding reports at scale, create a perverse economy where volume beats quality.
The Anatomy of an AI Slop Report
To understand why this matters beyond the security community, it helps to know what these reports actually look like. An AI-generated vulnerability report typically:
- Identifies a real code pattern — buffer handling, input parsing, memory allocation — that could theoretically be exploitable
- Lacks a working proof-of-concept — the report describes a theoretical attack path without demonstrating it
- Ignores existing mitigations — the AI does not account for compiler flags, runtime protections, or architectural constraints that render the theoretical vulnerability unexploitable
- Sounds authoritative — this is the dangerous part. The language is polished, the CVE references are real (even if irrelevant), and the formatting follows established conventions
For a maintainer, disproving one of these reports can take longer than fixing a real bug. You must trace the code path, verify the mitigations, test the theoretical exploit, and write a detailed response explaining why the report is invalid. Multiply that by dozens of submissions per week, and you have a maintainer who is no longer maintaining — they are performing unpaid quality assurance on AI-generated homework.
The Upstream Effect on Your Software
Here is where this becomes every development team’s problem. The open source libraries your application depends on are maintained by people who are now spending their finite volunteer hours triaging AI slop instead of reviewing pull requests, fixing genuine bugs, or cutting releases.
When Linus Torvalds says the kernel security mailing list is unmanageable, that affects the operating system your servers run on. When cURL maintainers are drowning in false reports, that affects the HTTP client your API calls depend on. The supply chain does not start at your package.json — it starts at the mental health and available hours of the people who write the code you import.
This is an extension of the same supply chain security concerns we have written about before. Except this time, the attack vector is not a malicious package — it is well-intentioned but low-quality noise that degrades the ecosystem’s ability to respond to real threats.
What the Platforms Are Doing
To their credit, the major platforms are adapting:
- GitHub now requires proof-of-concept exploits and concrete security impact statements. Submitting ineligible reports affects your reputation score.
- HackerOne and Bugcrowd are implementing AI-assisted triage with human oversight — using AI to fight AI, essentially.
- The Open Source Security Foundation (OpenSSF) is developing best practices for maintainers handling AI-generated submissions.
- Django updated its security documentation to explicitly reject AI-generated reports containing fabricated content.
These are sensible responses, but they are reactive. The fundamental tension remains: AI has made vulnerability discovery cheaper and faster, but remediation is still a human-speed, human-effort process.
What Your Development Team Should Do
Whether you run a startup or an enterprise engineering team, there are practical steps you can take right now.
1. Tighten Your Own Intake Criteria
If you run any kind of vulnerability disclosure programme — even an informal security@ email — update your submission criteria. Require working proof-of-concept exploits. Require specific version numbers and environment details. Make it clear that theoretical reports without demonstrated impact will be closed without investigation.
2. Invest in Automated Triage
Ironically, AI is both the problem and part of the solution. Tools like OpenAI’s Daybreak (launched in May 2026) and Snyk’s AI-assisted scanning can help pre-filter reports before they reach a human reviewer. If you are receiving a meaningful volume of security reports, automated first-pass triage is no longer optional.
3. Support Your Dependencies
If your product depends on open source libraries — and it does — consider how you support those maintainers. Financial sponsorship through GitHub Sponsors or Open Collective is one path. Contributing engineering time to triage and review is another. The maintainers keeping your supply chain secure are under more pressure than ever.
4. Train Your Team on AI-Generated Report Patterns
Make sure your developers and security engineers can recognise the hallmarks of an AI-generated report. The patterns are learnable: overly formal language, theoretical attack paths without PoC, irrelevant CVE cross-references, and a conspicuous absence of environment-specific detail.
5. Reassess Your Own AI Security Tooling
If your team uses AI for security scanning or code review, audit the signal-to-noise ratio. Are your AI tools generating actionable findings, or are they producing the same kind of plausible-sounding noise that is overwhelming the bug bounty ecosystem? Quality of findings matters more than quantity.
The Bigger Picture
This crisis is a microcosm of a broader pattern we are seeing across the software industry in 2026. AI makes production cheaper but does not make consumption cheaper. It is easier than ever to generate code, content, reports, and tickets — but the human effort required to review, validate, and act on those outputs has not changed.
Development teams that recognise this asymmetry early will build better processes. Those that do not will find themselves drowning in AI-generated noise across every channel — security reports, pull request reviews, support tickets, and more.
At REPTILEHAUS, we help development teams build robust security practices and sustainable engineering workflows. If you are rethinking your vulnerability management process or need help integrating AI-assisted security tooling without the noise, get in touch.
📷 Photo by Markus Spiske on Unsplash



