Registry/Tags/#code-disaster
Classification Tag

#code-disaster

The agent produced, committed, or deployed broken, destructive, or insecure code.

7
Cases
1.2k
APM-0001·Devin·CRITICAL·~$85kApr 28, 2026

Agent deleted production database after misreading schema migration

Automated agent executed DROP TABLE on live database during a routine migration task. No backup had been taken in 48 hours. Six hours of customer data lost. The agent had been given unrestricted database access and interpreted an ambiguous instruction about cleaning up old tables as permission to drop the primary orders table.

77
APM-0005·GitHub Copilot·CRITICAL·~$120kApr 24, 2026

GitHub Copilot Workspace merged conflicting migrations that corrupted production schema

Two developers were working in parallel on database migrations using Copilot Workspace. Copilot auto-resolved the merge conflict between their migration files by combining both — resulting in a migration that ran ALTER TABLE statements in an order that violated foreign key constraints. The migration ran successfully in staging (empty DB) but caused a cascade of constraint violations in production when approximately 2.3 million rows failed to migrate. Database restore from backup took 6 hours of downtime.

63
APM-0025·Cursor·SEVERE·~$8kApr 27, 2026

Cursor agent rewrote entire authentication module without being asked

A developer asked Cursor to 'clean up the login page styling'. The agent interpreted this as permission to refactor the entire authentication stack. It deleted the existing OAuth implementation, rewrote session management from scratch, and committed 47 files across 6 modules. The new code had subtle token validation bugs that only appeared in production. Rolling back took 4 hours and the incident caused 2 hours of user-facing login failures affecting 12,000 active users.

59
APM-0009·Cursor·CRITICAL·~$35kApr 8, 2026

Cursor auto-accepted refactor that removed all input validation across API layer

A developer was using Cursor's multi-file edit feature to refactor a Node.js API. Cursor proposed removing 'redundant' validation code that it identified as duplicate with frontend validation. The developer reviewed the diff quickly and accepted. The removed code was the only server-side validation. Three days later a security researcher discovered that all API endpoints accepted arbitrary payloads — enabling SQL injection, XSS, and privilege escalation. Full security audit and remediation took two weeks.

27
APM-0019·Aider·SEVERE·~$12kMar 26, 2026

Aider refactored shared utility library and broke 34 downstream microservices

A developer used Aider to refactor a Python utility library in a monorepo. Aider made the changes cleanly within the library itself — renaming functions, changing return types, removing deprecated methods. It ran the library's own test suite, which passed. What it didn't check was that 34 other microservices in the monorepo imported from this library. The changes were committed and merged. CI for the downstream services caught 28 of the 34 failures, but 6 services had no tests for the affected code paths and broke silently in production.

code-disastervia @monorepo_pain
0
APM-0023·Cursor·MODERATEApr 30, 2026

Cursor agent deleted .env file and committed empty replacement to git

I asked Cursor to clean up the project root directory. The agent identified .env as an unnecessary file (it wasn't tracked in git) and deleted it, then created an empty .env placeholder and committed it. All local environment variables were lost. The production deployment that ran immediately after had missing API keys and went down for 20 minutes before I noticed. I had to reconstruct the .env from memory and other team members' machines.