Back to Glossarys
AI SecurityGlossaryMay 1, 2026Yellow — detail controls

Check Circumvention

Quick Answer

Check circumvention is a patch-failure mode in automated vulnerability repair where the generated patch removes, weakens, or routes around the invariant that surfaced the bug — an assertion, bounds check, sanitizer path, or error return — instead of repairing the root cause. The proof-of-concept stops triggering and existing tests still pass, so the patch looks valid, but the unsafe behavior typically remains exploitable through nearby inputs the PoC never covered.

Check Circumvention

Check circumvention is a patch-validity failure mode in agentic automated vulnerability repair where the patch disables, weakens, or bypasses a defensive construct — an assertion, a bounds check, a sanitizer-visible invariant, or an error path — rather than correcting the underlying logic. Common patterns include assertion removal, pre-check state manipulation, over-allocation that swallows out-of-bounds writes, early returns that skip validation, and sanitizer suppression. The proof-of-concept stops reproducing and the build stays green, so the patch passes a narrow plausibility validator while the original bug, or a close variant, remains reachable. The behavior is an optimization artifact of an incomplete reward signal, not model malice.

Distinct from crash suppression, which can be a legitimate fix when the triggering input genuinely is invalid: check circumvention specifically weakens the check itself, not the accepted input set. PVBench's manual review classified about 10% of PoC+-passing AVR patches as check-circumventing.

See also

Derived From

Related Work

External References