Spectra Assure Free Trial
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial
With AI coding and open-source ecosystem risks redefining the application security (AppSec) landscape, teams charged with AppSec are facing increasing challenges.
The data points compiled below highlight a software supply chain that is under sustained and escalating attack, open-source ecosystems that are increasingly weaponized by adversaries, and security debt that is accumulating faster than organizations can address it.
The rapid and broad adoption of AI and agentic coding is adding to the problem by introducing new threats that existing tools are poorly equipped to handle.
Here are the 28 statistics that matter most to AppSec teams.
[ See webinar: Stop Trusting Packages — Start Verifying Them ]
Compromises tied to software suppliers, dependencies, and ecosystems
In a survey of cybersecurity leaders, a remarkable 5% said they had experienced 10 or more supply chain-related cybersecurity incidents.
Source: 2025 Supply Chain Security Threats, SecurityScorecard
The number found from the period between April 2025 and October 2025 was more than double the 13 attacks per month recorded between early 2024 and March 2025.
Source: Cyble
With two separate attacks in 2025, this first known instance of a registry-native worm exposed developer secrets across an estimated 25,000 repositories.
Source: 2026 Software Supply Chain Security Report, ReversingLabs
Exposures created by vulnerable, outdated, or poorly maintained components
Concerns over software vulnerabilities ranked only below worries about data breaches and malware/ransomware attacks. Some 35% in this survey were concerned about their lack of visibility over their software vendors’ cybersecurity practices.
Source: 2025 Supply Chain Risk Survey, ISC2
Many organizations are relying on software suppliers without proper risk assessment and supplier evaluations, a recent survey found.
Source: 2025 Supply Chain Risk Survey, ISC2
More than three-quarters (78%) of the codebases contained high-risk vulnerabilities, including critical flaws that enabled remote code execution and significant data compromises.
Source: 2026 Open Source Security and Risk Analysis, Black Duck
Increasing code complexity, component selection, and development speed drove a sharp increase in this number.
Source: 2026 Open Source Security and Risk Analysis, Black Duck
A startling 92% contained components that were at least four years out of date, making them vulnerable to compromise. A mere 7% contained the latest component versions.
Source: 2026 Open Source Security and Risk Analysis, Black Duck
High vulnerability percentages were most prevalent in environments running Java, .NET, or Rust applications and services.
Source: State of DevSecOps, Datadog
Attacks targeting open-source package ecosystems
In the remaining 34% of attacks, adversaries modified legitimate packages on public repositories to attack users.
Source: 2026 Open Source Security and Risk Analysis, Black Duck
The biggest increase across public repos was on npm, where the number of malicious packages more than doubled, from 5,290 in 2024 to 10,819 last year. That number represented almost 90% of all open-source malware in 2025.
Source: 2026 Software Supply Chain Security Report, ReversingLabs
That represented a 43% drop from the 1,575 samples detected on the repository in 2024. Malware detections on the NuGet .NET package repository dropped even more sharply, from 35 in 2024 to just 14 in 2025.
Source: 2026 Software Supply Chain Security Report, ReversingLabs
Backlogs of unresolved vulnerabilities and patching delays
Year over year, the percentage of companies that fell seriously behind on vulnerability increased by 11%.
Source: 2026 State of Software Security, Veracode
That was up 17% from the 42% of apps saddled with security debt in 2024.
Source: 2026 State of Software Security, Veracode
The complexities associated with remediating vulnerabilities in third-party code or components, combined with the nature of flaws in direct and transitive dependencies, continued to drive up the time organizations required to address them.
Source: 2026 State of Software Security, Veracode
How development workflows influence application security risk
Many organizations continue to lag with DevSecOps because of friction between development and security teams.
Source: The Future of Application Security in the Era of AI, Checkmarx
Twelve percent used public Amazon Machine Images and 32% used public Docker images within a day of release before vetting them, heightening the risk of installing malicious software.
Source: State of DevSecOps, Datadog
Instead of shifting security left, many development organizations, under pressure to deliver, have adopted patch-later models, despite the higher risk.
Source: The Future of Application Security in the Era of AI, Checkmarx
Most of the leaks occurred on the open-source, public repositories npm and PyPI, which accounted for 95% of all leaked secrets last year.
Source: 2026 Software Supply Chain Security Report, ReversingLabs
New risks introduced by AI coding tools and AI software components
In a survey of over 1,500 application security stakeholders, this study found that AI is writing the code at a fast-growing number of companies. And development teams are deploying the code with little regard to potential vulnerabilities in it.
Source: The Future of Application Security in the Era of AI, Checkmarx
That means LLMs recommended more than 10,000 hallucinated packages.
Source: 2026 State of the Software Supply Chain Report, Sonatype
While 43% of models originated from an open-source environment, the dataset’s lineage was often missing or incomplete.
Source: 2026 State of Agentic AI Adoption, Snyk
The trend with open-source models is quickly opening up a new attack surface that traditional application security tools cannot address.
2026 Open Source Security and Risk Analysis, Black Duck
How vulnerabilities are exploited and how security tools struggle to manage risk
Attacks targeting software flaws surged in 2025 — and emerged as the leading tactic that adversaries used in intrusion activity.
Source: Radware Threat Report 2026, Radware
Attackers increasingly used automated programs for data theft, denial-of-service attacks, account takeovers, and other malicious activities last year.
Source: Radware Threat Report 2026, Radware
The story was even worse when looking only at command injection issues in Python/Flask projects, with nearly 99.5% of flagged issues being false positives.
Source: Exorcising the SAST Demons, Ghost Security
Severity tools use these scores to quantify the potential impact and exploitability of a CVE so security teams can prioritize remediation. Without scores, the tools are useless.
Source: 2026 State of the Software Supply Chain Report, Sonatype
Dropoffs were most dramatic for .NET dependency vulnerabilities (98% get downgraded in severity after exploitability context is added). At the other extreme, 49% of PHP dependency vulnerabilities remain critical.
Source: State of DevSecOps, Datadog
Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial