been thinking about this after looking at vulnerability reports from different teams
most security tools are pretty good at the "what"
* this dependency has CVE-2024-whatever
* this function might have SQL injection
* this secret was committed to git
* this container image has 47 vulnerabilities
but they're terrible at the "so what"
like, okay, there's a path traversal in some utility function
but is that function even reachable from user input?
is it behind authentication?
does it handle sensitive data?
would exploiting it actually matter for this specific application?
without that context, everything gets the same treatment
critical findings that affect public endpoints get the same urgency as theoretical issues in dead code
medium severity vulns in core user flows get less attention than high severity findings in admin-only features that three people use
we've been experimenting with ways to give findings more business context while building kolega, and it's wild how much it changes prioritization
instead of "fix all the reds first" it becomes "fix the things that actually affect users first"
curious how other teams handle this
do you have ways to map security findings to actual business impact, or is everyone still mostly going by severity scores and hoping for the best?been thinking about this after looking at vulnerability reports from different teams
most security tools are pretty good at the "what"
* this dependency has CVE-2024-whatever
* this function might have SQL injection
* this secret was committed to git
* this container image has 47 vulnerabilities
but they're terrible at the "so what"
like, okay, there's a path traversal in some utility function
but is that function even reachable from user input?
is it behind authentication?
does it handle sensitive data?
would exploiting it actually matter for this specific application?
without that context, everything gets the same treatment
critical findings that affect public endpoints get the same urgency as theoretical issues in dead code
medium severity vulns in core user flows get less attention than high severity findings in admin-only features that three people use
we've been experimenting with ways to give findings more business context while building kolega, and it's wild how much it changes prioritization
instead of "fix all the reds first" it becomes "fix the things that actually affect users first"
curious how other teams handle this
do you have ways to map security findings to actual business impact, or is everyone still mostly going by severity scores and hoping for the best?