Why Vulnerability Detection Doesn’t Scale
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要观点。 文章主要讨论了应用安全(AppSec)团队在检测风险方面做得不错,但修复速度跟不上。随着AI生成代码的普及,漏洞数量和复杂性增加,传统的安全流程难以适应。检测已经扩展到各个层面,但执行和修复能力成为瓶颈。 接下来,文章提到修复和决策过程需要嵌入到开发流程中,特别是在拉取请求(pull request)阶段。通过自动化工具如Checkmarx One的Triage Assist和Remediation Assist,可以提高修复效率和一致性。此外,治理必须嵌入到工作流程中,而不是事后强制执行。 最后,文章指出未来的应用安全需要从检测转向执行,通过结构化的决策流程来提升修复能力。 现在我需要将这些要点浓缩到100字以内。重点包括:检测与修复的差距、AI的影响、拉取请求中的决策、自动化工具的作用以及治理的重要性。 可能的结构:AppSec团队检测能力强但修复慢;AI加剧问题;拉取请求是关键;自动化工具帮助修复;治理嵌入工作流;未来需重视执行而非检测。 现在组织语言: 应用安全团队在检测风险方面表现良好,但修复速度跟不上。AI生成代码加剧了漏洞数量和复杂性。修复瓶颈在于决策和执行过程未与开发流程整合。解决方案是将风险评估和修复嵌入拉取请求阶段,并利用自动化工具如Checkmarx One进行标准化处理。治理需嵌入工作流以确保一致性。未来应用安全需从单纯检测转向高效执行。 </think> 应用安全团队在检测风险方面表现良好,但修复速度跟不上。AI生成代码加剧了漏洞数量和复杂性。修复瓶颈在于决策和执行过程未与开发流程整合。解决方案是将风险评估和修复嵌入拉取请求阶段,并利用自动化工具如Checkmarx One进行标准化处理。治理需嵌入工作流以确保一致性。未来应用安全需从单纯检测转向高效执行。 2026-3-25 17:3:1 Author: checkmarx.com(查看原文) 阅读量:0 收藏

Most AppSec teams are not failing to detect risk. They’re just failing to remediate it fast enough. 

Security programs now find more vulnerabilities than they can fix, and remediation hasn’t kept pace with how fast teams ship code. AI-generated code has made that gap worse, adding volume and complexity faster than security processes have adapted. 

Coverage has expanded, scanning is continuous, and visibility is no longer the bottleneck – but the ability to act on that visibility at scale hasn’t kept up. Backlogs grow, MTTR stays stubbornly high, and the same classes of vulnerabilities reappear across releases, even as detection improves. 

The gap isn’t that security teams lack maturity. It’s that AppSec was never built to operate at this scale. 

Detection Has Scaled. Execution Has Not. 

A growing share of organizations now acknowledge shipping software with known vulnerabilities to keep delivery moving But the pace of exploitation is accelerating at the same time. Research shows that the average time to exploit newly disclosed vulnerabilities has dropped dramatically in recent years, with attackers increasingly weaponizing vulnerabilities within days of disclosure and sometimes within hours. In 2025, nearly one-third of known exploited vulnerabilities were exploited on or before the day they were publicly disclosed, leaving organizations little time to evaluate and remediate risk.  

The distance between discovery and remediation is no longer a theoretical chasm. It is operational, measurable, and increasingly visible to boards, regulators, and customers. 

Detection Solved Visibility, Not Outcomes 

For more than a decade, AppSec investments focused on improving detection – and that initially worked. Coverage expanded across proprietary code and open-source dependencies, scanning became faster, findings became richer,  and dashboards and reporting improved. But risk outcomes did not. 

Security teams now operate in an environment where visibility is abundant, but action is constrained. Thousands of findings accumulate without clear prioritization, causing analysts to spend hours validating reachability and exploitability. At the same time, developers receive findings without enough context to determine what actually matters. Different teams end up making different decisions on identical issues and the result is a system that knows more but fixes less. 

This mismatch is becoming more pronounced as AI continues to accelerate development velocity. Leaders at major software organizations have publicly stated that a significant portion of new code is now generated with AI assistance and only reviewed by engineers before release. 

More code, shipped faster, means more potential risk, and more risk requires more capacity to remediate, not just more capacity to detect. Detection surfaced the problem. It didn’t solve it.  

The Execution Gap Is the New AppSec Bottleneck 

The execution gap is not a single failure point, but the accumulation of small inefficiencies that compound at scale.  

Triage still depends on human judgment that gets repeated inconsistently across teams, with prioritization varying based on who happens to review a given finding. Fix guidance is often advisory, leaving developers to interpret and implement solutions themselves. And governance tends to exist in policy documents instead of the workflows where decisions are actually made. Individually, these issues are manageable. At AI-scale, they become systemic, thereby compounding AppSec challenges, not because teams lack tools, but because the system connecting detection to action is inconsistent. When execution varies, risk becomes unpredictable and auditability degrades. When workflows depend on manual interpretation, service-level commitments become unenforceable. 

 What looks like a technical problem is, at its core, actually an operational one. 

The Pull Request Is the Only Place Execution Can Scale

For years, AppSec findings have flowed into tickets, dashboards, and reports – but that’s not where fix decisions get made.  

Execution happens in the pull request, where code is reviewed, discussed, approved, and merged. It is where context exists, accountability is enforced, and decisions are recorded by default. Pull requests can be configured to block merges until required checks pass, including security scanning results.  

In practice, this means remediation decisions and risk acceptance already occur in the pull request workflow, whether security teams formally recognize it or not. So why are security decisions still being made outside of this workflow? 

From Detection to Decision Infrastructure 

Modern AppSec needs a system that can turn findings into decisions. Not every vulnerability is exploitable; some represent real, reachable risk, others are false positives, and others fall within acceptable risk thresholds depending on context. Today, this distinction is made manually and inconsistently.

Decision infrastructure changes that. It classifies findings with reasoning, distinguishes between what must be fixed and what can be deprioritized, and surfaces those decisions directly in the pull request. It enables guided, reviewable remediation that is aligned with how the application actually works.

The industry has largely moved toward context-driven prioritization, with modern vulnerability management frameworks emphasizing exploitability and real-world impact over severity scores alone. But translating detection signals into actionable risk decisions requires decision infrastructure, and without it, the value of detection is incomplete.

Where Triage and Remediation Actually Happen 

Modern AppSec programs are beginning to embed agentic workflows directly in the pull request, delivering security decisions and fixes where code is actually reviewed and merged. Checkmarx One is built on this model. Triage Assist addresses the first execution bottleneck: deciding what requires immediate action. It evaluates findings using contextual analysis to determine whether a vulnerability is reachable, exploitable, and relevant within the application environment. Instead of presenting developers with raw scan output, it produces decision-ready outcomes that identify which issues must be fixed, deferred, and or represent acceptable risk under policy. 

This shift replaces manual triage queues with consistent, evidence-based decision logic that can be applied across repositories, teams, and applications. Decisions become standardized, rationale becomes visible and governance becomes enforceable. 

Remediation Assist addresses the second execution bottleneck: turning decisions into completed work. Once an issue is identified as requiring action, remediation guidance is delivered directly in the pull request as a reviewable code change that aligns with the application’s frameworks and dependencies. Developers evaluate the proposed fix using their existing review process, preserving accountability and control while accelerating resolution. Human approval remains mandatory, but developers don’t need to start from scratch when addressing security issues. The path from detection to remediation becomes shorter, more predictable, and easier to govern. 

Together, these capabilities transform the pull request into a true execution layer for application security. Risk decisions are made where code changes occur, fixes are delivered where developers work, and evidence is recorded where auditors expect it.  

And this approach scales. 

Why Governance Must Be Embedded, Not Enforced Later 

When governance exists outside the workflow, it is optional by default. It relies on teams remembering to follow it, interpreting it correctly, and applying it consistently. At scale, that approach breaks down. 

But when governance is embedded in execution, it becomes part of how work gets done. This principle is increasingly reflected in secure software development standards. Frameworks such as the NIST Secure Software Development Framework emphasize the importance of maintaining evidence and artifacts that demonstrate how security decisions were made and implemented throughout the development lifecycle. 

That requirement changes what AppSec governance actually means.  Policy alone isn’t sufficient; what matters is documented execution that preserves human oversight, where prioritization criteria are applied consistently, remediation is scoped and controlled, and decisions are captured automatically without additional administrative overhead. This is the difference between policy and control. Triage and remediation capabilities built directly into development workflows don’t replace decision-making, they structure it, bringing prioritization, reasoning, and fix guidance into the pull request where decisions are already happening. The result is governed execution, not autonomous remediation.

What Changes When Execution Is Operationalized 

When execution is built into the workflow, the system begins to behave differently. 

Manual triage effort drops because classification is no longer repeated across teams. Time to decision shrinks because context and reasoning are already available. Remediation becomes more consistent because developers are not guessing what matters or how to fix it. Risk acceptance becomes explicit, not implied. Auditability improves because decisions are captured as part of normal development activity.  

Perhaps most importantly, the relationship between security and engineering changes. When developers receive clear, contextualized guidance in the pull request, security stops being perceived as noise and starts being seen as actionable input, reducing friction. The conversation shifts from asking why a finding exists to deciding what action should be taken. 

This shift is increasingly necessary as development complexity grows. Software supply chain risk, third-party dependencies, and AI-assisted development are expanding the attack surface faster than traditional workflows can keep pace.

Recent reporting shows that most organizations have experienced supply chain attacks within the past year, reinforcing the need for consistent, scalable remediation processes.  By adopting this approach, AppSec can scale effectively without requiring a proportional increase in headcount. 

The Necessary Shift to Agentic AppSec 

Detection is table stakes in 2026. The organizations that optimize detection alone will continue to generate more findings than they can act on. Backlogs will grow and the gap between visibility and execution will widen. Security teams will remain overwhelmed, and risk decisions will remain inconsistent.  

The organizations that operationalize execution will close that gap. They will make decisions where work happens. They will standardize how those decisions are made. They will embed governance into the workflow instead of enforcing it after the fact. And they will measure success not by how much they find, but by how much they fix.  

This shift is defining modern, agentic application security. 

Read the next article: Attackability: Why Context, Not Reachability, Should Drive Remediation

Learn how modern AppSec teams prioritize vulnerabilities based on reachability, exploitability, and real-world impact to reduce noise and focus remediation where it matters most. 

Tags:

Agentic AI

AI Agents

AI generated code

AppSec


文章来源: https://checkmarx.com/blog/why-vulnerability-detection-doesnt-scale/
如有侵权请联系:admin#unsafe.sh