the biggest problem with security scanners might be what they do to people
嗯,用户让我总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解它的主要观点。 文章主要讨论了安全工具在使用过程中产生的问题,特别是误报(false positives)对团队的影响。作者提到,虽然误报本身是一个问题,但更严重的是团队在长期处理误报后反应的变化。比如,他们开始不信任工具的输出,只是快速浏览而不是深入调查,只关注明显的关键问题,而其他问题则被忽视。这导致了真正的损害,不仅仅是工具噪音大,而是训练人们不再关心安全问题。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖误报、团队反应变化、信任度下降、处理方式转变以及最终的影响。 可能会这样组织语言:“文章指出安全工具的误报不仅产生噪音,还导致团队逐渐失去信任和关注。长期处理大量无效警报使团队只关注关键问题,忽视其他潜在风险。” 检查一下是否符合要求:100字以内?是的。没有使用“文章总结”之类的开头?是的。内容准确传达了文章的核心观点? 看起来没问题。 </think> 文章指出安全工具的误报不仅产生噪音,还导致团队逐渐失去信任和关注。长期处理大量无效警报使团队只关注关键问题,忽视其他潜在风险。 2026-3-24 11:4:42 Author: www.reddit.com(查看原文) 阅读量:3 收藏

one thing we kept noticing while testing security tools is that the problem isn’t just false positives by themselves

it’s what happens after teams have to deal with them over and over again

when a scanner keeps producing loads of findings, and a big chunk of them turn out not to matter, people start changing how they react

they trust the output less
they skim instead of investigate
they focus only on the obvious criticals
and everything else starts blending into background noise

that feels like the real damage

not just “this tool is noisy”
but “this tool is training people to stop caring”

we wrote a bit about this after running traditional SAST tools across 10 open source repos and seeing just how much noise came back vs how many findings were actually real:

https://kolega.dev/blog/the-87-problem-why-traditional-security-tools-generate-noise/

curious how other people see this

have security scanners made teams better at fixing issues where you’ve worked, or just more numb to vulnerability reports?


文章来源: https://www.reddit.com/r/blackhat/comments/1s2ao6z/the_biggest_problem_with_security_scanners_might/
如有侵权请联系:admin#unsafe.sh