16 billion lines of code. Generated by AI tools in 2023. That’s not a typo — it’s the raw flood from assistants like GitHub Copilot and Amazon CodeWhisperer, outpacing human devs by orders of magnitude.
Black Duck CEO Jason Schmitt dropped this bomb in a Dark Reading chat, laying bare how this AI-driven code surge is gutting traditional application security. AppSec teams? They’re drowning.
“AI is reshaping application security and why it must evolve to keep pace,” Schmitt told Terry Sweeney. Straight talk — no fluff.
Here’s the thing. Developers once spent weeks crafting apps. Now? Prompt, generate, deploy. Speed’s intoxicating. But that code? riddled with ghosts from training data — forgotten deps, deprecated libs, zero-days lurking like landmines.
Schmitt nails it: the sheer volume. Traditional scanners chug through repos at human speeds. AI spits code faster than you can say “supply chain attack.” Suddenly, every startup’s got a million-line monolith, unvetted.
Why Is AI Code So Damn Vulnerable?
Think back to Log4Shell. One lib, global chaos. AI amps that nightmare — pulling snippets from public repos without context. A model trained on GitHub? It’s marinating in every CVE since Y2K.
And devs? They’re hitting ‘accept’ on 30% of suggestions, per GitHub stats. Lazy? Nah. Pressure. Ship fast or die. Result: vulns baked in from commit zero.
Schmitt pushes shift-left harder than ever. Scan during generation, not post-build. Black Duck’s betting big on AI-powered SAST — static analysis that predicts flaws before the IDE blinks.
But wait. Isn’t this just vendor spin? (Black Duck sells exactly that tooling.) Schmitt admits the irony: use AI to fight AI. Models fine-tuned on clean codebases, flagging patterns humans miss.
Short para. Brutal truth.
How Did We Get Here So Fast?
Rewind to 2021. Copilot drops. Hype explodes. By 2023, enterprises report 55% productivity bumps — McKinsey numbers, take with salt. Code volume triples. AppSec budgets? Flatline.
Underlying shift? Architecturally, it’s the death of the monorepo myth. Microservices were messy; AI code’s fractal. Each snippet a potential trojan. Supply chain risks? SolarWinds on steroids, automated.
Schmitt’s unique angle — and mine: this echoes the open-source deluge of the early 2010s. Remember Heartbleed? OSS explosion without sec guardrails. We built SCA tools then. Now? AI demands SCA 2.0, probabilistic, real-time.
Prediction: by 2026, 70% of breaches trace to AI-gen code. Bold? Check the trajectory. Log4j vulns still haunt us; AI recycles them effortlessly.
Teams scrambling. Manual reviews? Laughable. Dynamic testing? Too late. Enter policy-as-code engines, enforcing sec at merge. Black Duck integrates SBOMs — software bills of materials — auto-generated, AI-vetted.
Skeptical? Me too. SBOMs promised much post-EO 14028. Compliance theater, mostly. But AI forces real enforcement — or regulators (looking at you, EU) will.
Can AppSec Catch the AI Wave?
Schmitt’s fix: evolve or perish. Hybrid human-AI pipelines. Tools that not only scan but explain — why this vuln, fix in one click.
Critique time. Black Duck’s pitch smells PR-polished. “Reshaping” sounds sexy, but it’s reactive. Where’s proactive? Train models on threat intel feeds, preempt vulns.
Deeper why: economic. AI code slashes dev costs 40%. Sec lags? Breaches cost millions. CISO math flips — invest now.
Real-world: fintech firm’s using Black Duck to gate AI outputs. Vulns drop 60%. Anecdotal? Sure. But scale it.
Architectural pivot. From perimeter defense to code DNA. Every line sequenced for threats. Sounds sci-fi? It’s here.
Dev burnout factors in. AI eases grunt work, but sec hygiene? Still on them. Tools must idiot-proof it.
Why Does This Matter for Your Stack?
If you’re running Node, Python, Java — prime AI fodder — audit now. Legacy scanners miss AI patterns: synthetic vulns, hallucinated deps.
Schmitt warns of shadow AI — rogue devs bypassing gates. Enterprise sprawl 2.0.
Fixes? Embed sec in IDEs. Copilot + Black Duck plugin. Approve code live.
Historical parallel: antivirus vs. zero-days. We went behavioral. AppSec goes generative — predict flaws from prompts.
One para wonder. Game on.
Pushback. AI hype cycles crash. What if adoption stalls? Unlikely. Productivity’s sticky.
Bold call: AppSec winners? AI natives like Black Duck, Snyk. Laggards? Gartner Magic Quadrant dinosaurs.
🧬 Related Insights
Frequently Asked Questions
What is AI-driven code surge in AppSec?
It’s the explosion of AI-generated code overwhelming traditional security scans — billions of lines yearly, packed with hidden vulns.
How is Black Duck responding to AI code risks?
They’re building AI-powered scanners that analyze code during generation, integrating SBOMs and shift-left policies to catch flaws early.
Will AI replace AppSec teams?
No — it amps them. Humans handle policy, AI does the grunt scanning, but oversight stays crucial.