{"id":53150,"date":"2023-08-09T21:39:00","date_gmt":"2023-08-09T21:39:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/darpa-launches-contest-tools-vulnerabilities"},"modified":"2023-08-09T21:39:00","modified_gmt":"2023-08-09T21:39:00","slug":"darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/","title":{"rendered":"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>BLACK HAT USA \u2013 Las Vegas \u2013 Wednesday, Aug. 9 \u2014<\/strong> The Defense Advanced Research Projects Agency (DARPA) will sponsor a two-year competition to create a new generation of cybersecurity tools to better secure software. DARPA is a research and development agency of the US Department of Defense (DoD), responsible for the development of emerging technologies for use by the military.<\/p>\n<p>Named the <a href=\"http:\/\/aicyberchallenge.com\/\" target=\"_blank\" rel=\"noopener\">AI Cyber Challenge<\/a> (AIxCC), the intention is to create AI-driven systems to help address cybersecurity issues and ensure more secure software. On the keynote stage at the Black Hat conference, AIxCC program manager Perri Adams announced the opening of the challenge. She said that as software enables modern life and drives productivity, it also creates an expanding attack service for malicious actors.<\/p>\n<p>&#8220;Recent <a href=\"https:\/\/www.darkreading.com\/dr-tech\/fight-ai-with-ai\" target=\"_blank\" rel=\"noopener\">technological advances<\/a> do offer promising new ways of ensuring that we can keep defense one step ahead,&#8221; she said. &#8220;The gains of AI, when used responsibly, have remarkable potential to secure our code.&#8221;<\/p>\n<p>However, Adams said that the promise of what AI could do isn&#8217;t enough, and a &#8220;forcing function&#8221; is needed to bring together top figures in AI and cybersecurity to show how AI can be used for good.<\/p>\n<h2 class=\"regular-text\">Solving Software Security With AI in 2 Years?<\/h2>\n<p>The contest, which Adams said will conclude in 2025 at DEF CON, challenges competitors to design AI systems to rapidly find and fix vulnerabilities in critical code.<\/p>\n<p>&#8220;This is an opportunity to use the technology to make a real difference to build something that can achieve dramatic structural change,&#8221; she said. &#8220;We hope with this new DARPA challenge, we will spur such incredible innovation.&#8221;<\/p>\n<p>AIxCC will offer two tracks for participation: the Funded Track and the Open Track. Funded Track competitors will be selected from proposals submitted to a <a href=\"https:\/\/www.dodsbirsttr.mil\/topics-app\/?baa=DOD_SBIR_2023_P1_C4\" target=\"_blank\" rel=\"noopener\">Small Business Innovation Research solicitation<\/a>.<\/p>\n<p>In the competition, prizes include $20 million to the teams with the best systems, while up to $1 million will be offered to seven small businesses too. Those teams with the best options will be assessed next spring, with semifinalists announced next summer at DEF CON 2024 and winners announced the following year at DEF CON 2025.<\/p>\n<p>&#8220;The top five semifinalists will win $2 million each and have the opportunity to spend a year advancing their technology,&#8221; Adams said. The semifinalists will have a year to build a system that can rapidly defend critical infrastructure from attack.<\/p>\n<p>The AIxCC is backed by Google, Anthropic, Microsoft, and OpenAI, while the Open Source Security Foundation will serve as a challenge advisor.<\/p>\n<p>&#8220;We have a competition that shapes innovation around real world problems. We want to create systems that automatically defend any kind of software from attack, from use in commercial industry to life-saving medical devices,&#8221; Adams said.<\/p>\n<h2 class=\"regular-text\">Where AI Fits the Bill<\/h2>\n<p>Michael Sellitto, head of geopolitics and security at Anthropic, says technology moves quickly, and software developers are already <a href=\"https:\/\/www.darkreading.com\/application-security\/can-generative-ai-be-trusted-to-fix-your-code-\" target=\"_blank\" rel=\"noopener\">using AI to write<\/a> significant portions of code.<\/p>\n<p>&#8220;It can help interpret or suggest alternatives to code that they&#8217;re working with, and so we&#8217;re not that far away from the technology being, you know, good at finding and fixing vulnerabilities and sort of a focused effort,&#8221; he says. &#8220;This challenge can accelerate those efforts pretty quickly, as two years ago, nobody was using AI to write code at all, and today, it&#8217;s become sort of the daily workflow for significant portion of coders.&#8221;<\/p>\n<p>Adams says the goal is to develop very usable systems that can have a dramatic impact on securing software, and the desire is to have that success serve as an example of how AI can be used to solve a key challenge in society. &#8220;Our goal is to develop cutting edge technology that can secure software at scale; tools that can ingest software and say &#8216;Hey, I found all of these bugs and here are fixes&#8217; that would remove the vulnerable code and replace it with secure code,&#8221; she said.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/darpa-launches-contest-tools-vulnerabilities\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A challenge will be offered to teams to build tools using AI in order to solve open source&#8217;s vulnerability challenges.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/darpa-launches-contest-tools-vulnerabilities\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53150","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-09T21:39:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities\",\"datePublished\":\"2023-08-09T21:39:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/\"},\"wordCount\":656,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4800e42ecaa599ff\\\/64d3f571916c39f6a7e76d70\\\/Perri_Adams_DARPA_Dan_Raywood.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/\",\"name\":\"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4800e42ecaa599ff\\\/64d3f571916c39f6a7e76d70\\\/Perri_Adams_DARPA_Dan_Raywood.jpg\",\"datePublished\":\"2023-08-09T21:39:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4800e42ecaa599ff\\\/64d3f571916c39f6a7e76d70\\\/Perri_Adams_DARPA_Dan_Raywood.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt4800e42ecaa599ff\\\/64d3f571916c39f6a7e76d70\\\/Perri_Adams_DARPA_Dan_Raywood.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-09T21:39:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities","datePublished":"2023-08-09T21:39:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/"},"wordCount":656,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/","url":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/","name":"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg","datePublished":"2023-08-09T21:39:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt4800e42ecaa599ff\/64d3f571916c39f6a7e76d70\/Perri_Adams_DARPA_Dan_Raywood.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/darpa-launches-two-year-contest-to-build-ai-tools-to-fix-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53150"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53150\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}