Key Finding: Analysis of 43 GitHub repositories reveals Claude Code users have zero exposed credentials, while Continue.dev had 576 credentials in a single repo. Security scores range from 41-47/100 across all tools.
We analyzed 43 real GitHub repositories using five major AI coding assistants to measure their security posture. The analysis scanned for security advisories, exposed credentials, and overall repository health.
Methodology: GitHub repository analysis using automated security scanning across repos with CLAUDE.md, .cursorrules, copilot-instructions.md, .continue.md, and .aider.md files.
| Tool | Repos Scanned | Avg Security Score | Exposed Credentials | Security Advisories |
|---|---|---|---|---|
| Claude Code | 10 | 47/100 | 0 | 0 |
| Continue.dev | 10 | 42/100 | 576 (1 repo) | 0 |
| Aider | 3 | 42/100 | 0 | 0 |
| Cursor | 10 | 41/100 | 1 (1 repo) | 5 (1 repo) |
| GitHub Copilot | 10 | 41/100 | 5 (2 repos) | 0 |
The most significant security difference wasn't the average score—it was credential exposure:
Critical Finding: One Continue.dev repository (hujianli94/my_Go_Py_blog) contained 576 exposed credentials. This is a massive security risk representing API keys, passwords, or tokens committed to version control.
Exposed credentials in public repositories create immediate security risks:
Only one repository across all 43 scanned had security advisories: heyverse/hey using Cursor.
Finding: heyverse/hey had 5 security advisories and scored 0/100—the lowest security score in the entire analysis. This appears to be an outlier rather than a systematic Cursor issue.
Repositories were classified into risk categories based on security scores:
| Tool | 🔴 Critical (0-30) |
🟠 High (31-60) |
🟡 Medium (61-80) |
🟢 Low (81-100) |
|---|---|---|---|---|
| Claude Code | 4 | 5 | 1 | 0 |
| Cursor | 6 | 2 | 2 | 0 |
| GitHub Copilot | 4 | 5 | 1 | 0 |
| Continue.dev | 6 | 3 | 0 | 1 |
| Aider | 1 | 2 | 0 | 0 |
The 6-point spread in average scores (41-47/100) is less meaningful than the credential exposure data:
Insight: Security is about minimums, not averages. A single repository with hundreds of exposed credentials creates more risk than improving average scores by 6 points.
This analysis has important limitations:
git log -p to search for accidentally committed secretsClaude Code's zero exposed credentials and 47/100 security score represent the best performance in this analysis. However, the 6-point score difference between tools is less significant than the credential exposure data.
Bottom Line: No AI coding assistant can prevent you from committing credentials to Git. Security depends on developer practices, pre-commit hooks, and organizational policies—not tool selection.
Methodology Note: This analysis scanned GitHub repositories containing configuration files for each AI coding assistant. Security scores were calculated based on dependency vulnerabilities, credential exposure, and repository maintenance indicators. The sample size is small (n=43) and results should not be generalized without additional research.
Data Collection Date:
← Back to Blog