AI & vibe coding glossary.
Plain-English definitions of 42 terms across AI, vibe coding, security and Australian compliance. Written for the non-technical reader who wants to know what their team is talking about, and the technical reader who wants to know how it lands in an Australian context.
AI & Development.
Agentic AI
AI systems that take actions in the world over multiple steps, not just produce a single response.
READ →Agentic Coding
Software development where an AI agent autonomously plans, writes, tests and ships code with minimal human keystrokes.
READ →Fine-tuning
Adjusting a pre-trained AI model's weights on a smaller, specialised dataset so it performs better on a specific task.
READ →Foundation Model
A large AI model pre-trained on broad data that can be adapted to many downstream tasks.
READ →Hallucination
When an AI model generates output that is plausible but factually incorrect or fabricated.
READ →Jailbreak
An adversarial prompt that bypasses an AI model's built-in safety rules to make it produce content it normally would not.
READ →Model Context Protocol
MCPAn open standard from Anthropic that lets AI assistants connect to external tools and data sources securely.
READ →Prompt Engineering
The practice of writing inputs to AI models in ways that produce reliable, well-structured outputs.
READ →Retrieval-Augmented Generation
RAGAn AI architecture that retrieves relevant documents from a knowledge base and feeds them to a model so the model answers from your data.
READ →System Prompt
The hidden instructions sent to a language model before any user input, defining its role, rules and behaviour.
READ →Vector Database
A specialised database that stores text or other content as numeric embeddings and supports similarity search.
READ →Vibe Coding
Building software primarily by prompting an AI in plain English rather than writing the code yourself.
READ →Tools & Platforms.
Bolt.new
A browser-based full-stack AI app builder by StackBlitz that ships working apps from natural language prompts.
READ →Claude Code
Anthropic's command-line agentic coding tool that reads, writes and edits code across an entire repository.
READ →Cursor
An AI-first code editor that combines autocomplete, chat and multi-file refactoring with several foundation models.
READ →Lovable
A web-based AI app builder that generates React + Supabase applications from natural language prompts.
READ →n8n
An open-source, fair-code automation platform that you can self-host or run as a managed cloud service.
READ →Replit
A browser-based development environment with built-in hosting and an AI agent that writes and deploys code.
READ →Supabase
An open-source backend-as-a-service that provides a Postgres database, auth, storage and edge functions.
READ →Security.
Cross-Site Request Forgery
CSRFAn attack where a user's authenticated session is abused to perform actions they did not intend, by tricking their browser into making a request.
READ →Cross-Site Scripting
XSSAn attack where malicious script is injected into a trusted website and runs in other users' browsers.
READ →OWASP Top 10
A list of the most critical web application security risks, maintained by the Open Web Application Security Project.
READ →OWASP Top 10 for LLM Applications
OWASP's parallel security list specifically for applications built on large language models.
READ →Penetration Testing
An authorised simulated attack on a system to find vulnerabilities before a real attacker does.
READ →Prompt Injection
An attack where untrusted input contains instructions that the AI model follows, overriding the developer's intent.
READ →Role-Based Access Control
RBACA model where permissions are granted to roles, and users are assigned to roles, rather than permissions being assigned per user.
READ →Server-Side Request Forgery
SSRFAn attack where a server is tricked into making an HTTP request to an internal or unexpected destination on behalf of an attacker.
READ →Supabase Row Level Security
Postgres feature, exposed in Supabase, that enforces per-row access rules so the database itself decides who can see or modify each row.
READ →Zero-Trust Security
A security model where no user, device or service is trusted by default, including those inside the network perimeter.
READ →Australian Compliance.
ACNC
The national regulator of charities in Australia, responsible for registration, transparency and governance.
READ →ACSC
The Australian government's lead agency for cyber security, part of the Australian Signals Directorate.
READ →AHPRA
The national agency that regulates registered health practitioners in Australia, including their use of technology with patient information.
READ →Essential Eight
The Australian Cyber Security Centre's recommended baseline of eight mitigation strategies for protecting business systems against cyber threats.
READ →IRAP
An ASD program of independent assessors who evaluate ICT systems against Australian government security requirements.
READ →NDIS
Australia's national insurance scheme that funds support for people with permanent and significant disability, with mandatory standards for registered providers.
READ →NOPSEMA
The independent regulator for safety, well integrity and environmental management of Australian offshore oil and gas operations.
READ →Notifiable Data Breaches Scheme
Australian law requiring organisations covered by the Privacy Act to notify affected individuals and the OAIC about eligible data breaches.
READ →OAIC
Australia's national regulator for privacy, freedom of information and government information policy.
READ →Privacy Act 1988
The Australian federal law that governs how organisations collect, use, disclose and protect personal information.
READ →Developer Concepts.
Content Security Policy
CSPAn HTTP response header that tells browsers which sources of script, style, image and other content the page is allowed to load.
READ →Environment Variable
A named value injected into an application at runtime, used to configure behaviour and inject secrets without committing them to code.
READ →Source Map
A file that maps minified production JavaScript back to the original source code, useful for debugging but a leak risk if shipped to production.
READ →