China’s DeepSeek-R1 LLM generates up to 50% more insecure code when prompted with politically sensitive inputs such as “Falun Gong,” “Uyghurs,” or “Tibet,” according to new research from CrowdStrike. The latest in a series of discoveries — following Wiz Research’s January database exposure, NowSecure’s iOS app vulnerabilities, Cisco’s 100% jailbreak success rate, and NIST’s finding that DeepSeek is 12x more susceptible to agent hijacking — the CrowdStrike findings demonstrate how DeepSeek’s geopolitical censorship mechanisms are embedded directly into model weights rather than external filters. DeepSeek is weaponizing Chinese regulatory compliance into a supply-chain vulnerability, with 90% of developers relying on AI-assisted coding tools, according to the report. What’s noteworthy about this discovery is that the vulnerability isn’t in the code architecture; it’s embedded in the model’s decision-making process itself, creating what security researchers describe as an unprecedented threat vector where censorship infrastructure becomes an active exploit surface.CrowdStrike Counter Adversary Operations revealed documented evidence that DeepSeek-R1 produces enterprise-grade software that is riddled with hardcoded credentials, broken authentication flows, and missing validation whenever the model is exposed to politically sensitive contextual modifiers. The attacks are noteworthy for being measurable, systematic, and repeatable. The researchers were able to prove how DeepSeek is tacitly enforcing geopolitical alignment requirements that create new, unforeseen attack vectors that every CIO or CISO experimenting with vibe coding has nightmares about.In nearly half of the test cases involving politically sensitive prompts, the model refused to respond when political modifiers were not used. The research team was able to replicate this despite internal reasoning traces showing the model had calculated a valid, complete response. Researchers identified an ideological kill switch embedded deep in the model’s weights, designed to abort execution on sensitive topics regardless of the technical merit of the requested code.The research that changes everythingStefan Stein, manager at CrowdStrike Counter Adversary Operations, tested DeepSeek-R1 across 30,250 prompts and confirmed that when DeepSeek-R1 receives prompts containing topics the Chinese Communist Party likely considers politically sensitive, the likelihood of producing code with severe security vulnerabilities jumps by up to 50%. The data reveals a clear pattern of politically triggered …