Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies