Paul Krill
Editor at Large

AI used extensively for security but not for coding, JFrog survey finds

news
Mar 20, 20242 mins

Most organizations use AI/ML-powered tools to assist in security scanning and remediation, but only a third use them to write code, JFrog reports.

red eyed tree frog
Credit: Ron Cogswell

In JFrog’s just-released Software Supply Chain State of the Union 2024 report, the software supply chain platform provider found extensive use of AI and machine learning tools for security. However, only one in three software developers the company surveyed use generative AI to write code.

While 90% of survey respondents indicate their organizations currently use AI/ML-powered tools in some capacity to assist in security scanning and remediation, only about one in three professionals, 32%, said their organizations use AI/ML-powered tools to write code. This indicates the majority still are wary of the potential vulnerabilities that AI-generated code can introduce to enterprise software, JFrog said.

Released March 19, JFrog’s report combines JFrog Artifactory developer usage data from more than 7,000 organizations, original CVE (Common Vulnerabilities and Exposures) analysis by the JFrog security research team, and commissioned third-party survey data of 1,200 technology professionals worldwide to provide context into the software supply chain landscape.

The report also notes that nearly half of respondents, 47%, said they use between four and nine application security solutions. One-third said they are using 10 or more application security solutions.

Other findings in JFrog’s Software Supply Chain State of the Union 2024 report:

  • Security is taking a toll on productivity. A full 40% of survey respondents said it typically takes a week or longer to get approval to use a new package or library. Approximately 25% of security teams’ time is spent remediating vulnerabilities.
  • Denial of service attacks reign. Nearly half (48.9%) of CVEs analyzed hold the potential for a DoS attack, compared to 18.9% that have the potential to perform remote code execution. This is good news, JFrog said, because remote code execution has a far more detrimental impact.
  • Not all CVEs are what they seem. The JFrog security research team downgraded the severity of 85% of critical CVEs and 73% of high CVEs on average after analyzing 212 different high-profile CVEs found in 2023.
  • More than half of organizations (53%) use four to nine programming languages, and 31% use more than 10 languages.
Paul Krill

Paul Krill is editor at large at InfoWorld. Paul has been covering computer technology as a news and feature reporter for more than 35 years, including 30 years at InfoWorld. He has specialized in coverage of software development tools and technologies since the 1990s, and he continues to lead InfoWorld’s news coverage of software development platforms including Java and .NET and programming languages including JavaScript, TypeScript, PHP, Python, Ruby, Rust, and Go. Long trusted as a reporter who prioritizes accuracy, integrity, and the best interests of readers, Paul is sought out by technology companies and industry organizations who want to reach InfoWorld’s audience of software developers and other information technology professionals. Paul has won a “Best Technology News Coverage” award from IDG.

More from this author