Goodbye SDLC, Hello ADLC: How Will AppSec Adapt?
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。首先,我需要通读整篇文章,理解它的主要观点和结构。 文章主要讨论了软件开发生命周期(SDLC)对应用安全的影响。传统上,SDLC假设代码是由人类编写,并且有明确的阶段和停顿点,在这些点上进行安全审查。但现在,随着AI的介入,代码生成和修改变得更加自动化和持续化,传统的SDLC模型已经不再适用。 文章引入了Agentic Development Lifecycle(ADLC),这是一种新的开发方法论,结合了人类和AI系统的工作。在这种模型下,代码的变化是持续的、快速的,传统的安全控制点如阶段审查、集中式审查等变得不再有效。因此,应用安全必须适应这种变化,转向持续的安全监控和自动化工具。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖传统SDLC的局限性、AI带来的变化、ADLC的概念以及对应用安全的影响。同时要注意语言简洁明了。 可能的结构是:先说明传统SDLC对AppSec的影响已过时,然后引入AI带来的变化和ADLC的概念,最后指出AppSec需要转向持续监控和自动化工具。 现在试着组织语言: “传统软件开发生命周期(SDLC)对应用安全的影响已过时。AI推动代码生成与修改自动化,使开发进入持续循环。新的Agentic Development Lifecycle(ADLC)要求应用安全实时监控并自动化处理风险。” 这样大约在40字左右,可能还可以加入更多细节: “传统软件开发生命周期(SDLC)对应用安全的影响已过时。AI推动代码生成与修改自动化,使开发进入持续循环。新的Agentic Development Lifecycle(ADLC)要求应用安全实时监控并自动化处理风险。” 或者: “传统软件开发生命周期(SDLC)对应用安全的影响已过时。AI推动代码生成与修改自动化,使开发进入持续循环。新的Agentic Development Lifecycle(ADLC)要求应用安全实时监控并自动化处理风险。” 这样应该符合用户的要求。 </think> 传统软件开发生命周期(SDLC)对应用安全的影响已过时。AI推动代码生成与修改自动化,使开发进入持续循环。新的Agentic Development Lifecycle(ADLC)要求应用安全实时监控并自动化处理风险。 2026-1-26 18:49:33 Author: checkmarx.com(查看原文) 阅读量:2 收藏

Application security, as it exists today, was shaped by the Software Development Lifecycle. 

The SDLC assumed that code was written primarily by humans, progressed through recognizable phases, and paused naturally at points where review made sense.  

Security controls were layered onto those pauses – during pull requests, before releases, or after builds – because that’s where time existed to apply them. 

Those assumptions are becoming obsolete.  

The SDLC Mental Model Is Breaking 

AI has changed how code comes into existence. An increasing number of modern codebases are now generated, modified, and refactored continuously, often without a clear distinction between “writing,” “fixing,” and “improving.” 

The lifecycle no longer advances in steps or clear breaks. It loops. 

Once that happens, many of the places where AppSec traditionally operated, like stage gates, handoffs, centralized review queues, lose their effectiveness. They weren’t designed for continuous change, and they weren’t designed for machine-paced production. 

What ADLC Actually Describes 

The Agentic Development Lifecycle (ADLC) is a new methodology that is shaping a new reality. 

In an ADLC environment, humans and AI systems work together to produce and evolve software continuously. Developers guide intent and direction, while AI systems generate, transform, and extend code at a rate that no longer maps cleanly to phases or milestones. 

This changes the unit of work AppSec has to reason about: Instead of releases or pull requests, security has to contend with a constant stream of small, fast-moving changes. 

Why Existing AppSec Models Struggle 

Most AppSec programs were built around interruption: stop here, scan there, review later. That approach assumes development can afford to wait. 

In ADLC, waiting becomes part of the risk. 

Centralized security teams cannot manually review the volume of code produced by AI-assisted workflows, and stage-based tooling struggles to stay relevant when code is rewritten multiple times before it ever reaches a traditional checkpoint. 

There’s also a growing false sense of safety around AI-assisted development.  

Because AI-generated code often looks clean, idiomatic, and well-structured, it’s easy to assume it is safer than hand-written code.  

In practice, it frequently reproduces insecure patterns, makes inconsistent trust assumptions, and introduces vulnerabilities that are harder to spot precisely because they appear reasonable. 

The impact is felt on both sides of the organization: Security teams lose timely visibility and effective control as AI accelerates code creation beyond traditional review models.  

At the same time, developers experience security as an after-the-fact interruption, flagging issues in code that has already changed.  

ADLC exposes a fundamental mismatch: tools designed for sequential development cannot keep pace with AI-driven workflows without compromising either security or speed. 

What AppSec Has to Become 

If development is continuous, security has to operate continuously as well. 

That means security systems need to evaluate code as it is created and modified, not after the fact. They need to understand context – how a piece of code fits into a broader system – and they need to act without relying on human intervention for every decision. 

This is where agentic AI becomes necessary rather than aspirational. Security systems need the ability to reason about changes, apply organizational policies automatically, and persist alongside development rather than responding to snapshots. 

In practical terms, this pushes AppSec closer to where development decisions are made: inside the IDE and before changes are committed. It’s where developers’ convenience and necessity intersect, because that’s where intent is expressed and where correction is still cheap. 

The Developer Workflow Is Changing 

As AI takes on more of the mechanical aspects of coding, developers spend more time directing, validating, and integrating output. Security decisions increasingly happen implicitly, through what developers accept, reject, or modify. 

Independent research such as the BaxBench benchmark, which measures how well large language models generate backend applications that are both functionally correct and secure, shows a stark reality:  

Even flagship models frequently produce code that may or may not work but still contain security vulnerabilities. In the BaxBench evaluation, many generated programs that passed functional tests still failed security checks when exposed to expert-designed exploits, indicating that correctness and security don’t automatically coincide in AI-generated outputs. 

AppSec has to align with that reality. Guidance that arrives late or requires developers to context-switch will be ignored, regardless of policy. Guidance that arrives in-line, with enough context to be actionable, has a chance to influence outcomes at scale. 

Appsec in SDLC vs. ADLC
AppSec in SDLC vs. ADLC

This doesn’t eliminate governance. Organizational standards, risk tolerances, and compliance requirements still matter. What changes is how they are enforced: automatically and continuously, rather than episodically and manually. 

Organizational Consequences 

In many organizations, this shift is already reshaping responsibility boundaries. AppSec capabilities are beginning to intersect more closely with platform engineering and emerging AI engineering teams, reflecting the fact that security, developer experience, and AI systems are now tightly coupled. 

Security becomes less about approval and more about enablement, providing guardrails that operate at the same speed as development rather than trying to slow it down. 

Closing 

ADLC doesn’t leave much room for AppSec to catch up later. Code is produced continuously, changes compound quickly, and delayed feedback becomes indistinguishable from no feedback at all. 

That reality forces a simple conclusion: security has to operate inside the development loop itself, aligned to how software is actually produced in an AI-driven lifecycle. 

Checkmarx.dev offers a view on what ADLC-oriented security looks like in practice, with Checkmarx Developer Assist – an agentic security linter that operates directly inside supported IDEs to evaluate risk as code is written – before commits, pipelines, or handoffs exist.  

Developers and AI engineers can try it hands-on through a free trial in IDEs like VS Code, Cursor, Windsurf, and AWS Kiro. 

If SDLC framed how AppSec worked for the last decade, ADLC will define what works next. 

Learn more and get your free trial at https://checkmarx.dev 

This article was originally published on Checkmarx’s LinkedIn Newsletter, “The Monthly Checkup”.

Tags:

AI generated code

AI in Engineering

SDLC

Secure SDLC


文章来源: https://checkmarx.com/ai-llm-tools-in-application-security/goodbye-sdlc-hello-adlc-how-will-appsec-adapt/
如有侵权请联系:admin#unsafe.sh