Security leaders consider banning AI coding due to security risks
92% of security leaders have concerns about the use of AI-generated code within their organization, according to Venafi.
Tension between security and developer teams
83% of security leaders say their developers currently use AI to generate code, with 57% saying it has become common practice. However, 72% feel they have no choice but to allow developers to use AI to remain competitive, and 63% have considered banning AI in coding due to security risks.
66% of survey respondents report security teams can’t keep up with AI-powered developers. As a result, security leaders feel like they are losing control and that businesses are being put at risk, with 78% believing AI-developed code will lead to a security reckoning and 59% losing sleep over the security implications of AI.
63% of security leaders think it is impossible to govern the safe use of AI in their organization, as they do not have visibility into where AI is being used. Despite concerns, 47% of companies have policies to ensure the safe use of AI within development environments.
“Security teams are stuck between a rock and a hard place in a new world where AI writes code. Developers are already supercharged by AI and won’t give up their superpowers. And attackers are infiltrating our ranks – recent examples of long-term meddling in open source projects and North Korean infiltration of IT are just the tip of the iceberg,” said Kevin Bocek, Chief Innovation Officer at Venafi.
“Anyone today with an LLM can write code, opening an entirely new front. It’s the code that matters, whether it is your developers hyper-coding with AI, infiltrating foreign agents or someone in finance getting code from an LLM trained on who knows what. So it’s the code that matters! We have to authenticate code wherever it comes from,” added Bocek.
Key concerns for AI-created code among security leaders
When looking at specific concerns around developers using AI to write or generate code, security leaders cited three top concerns:
- Developers would become over-reliant on AI, leading to lower standards
- AI-written code will not be effectively quality checked
- AI will use dated open-source libraries that have not been well-maintained
The research also highlights that it is not only AI’s use of open source that could present challenges to security teams:
Open source overload: On average, security leaders estimate 61% of their applications use open source. This over-reliance on open source could present potential risks, given that 86% of respondents believe open source code encourages speed rather than security best practice amongst developers.
Vexing verification: 90% of security leaders trust code in open source libraries, with 43% saying they have complete trust – yet 75% say it is impossible to verify the security of every line of open source code. As a result, 92% of security leaders believe code signing should be used to ensure open source code can be trusted.
“The recent CrowdStrike outage shows the impact of how fast code goes from developer to worldwide meltdown,” Bocek adds. “Code now can come from anywhere, including AI and foreign agents. There is only going to be more sources of code, not fewer. Authenticating code, applications and workloads based on its identity to ensure that it has not changed and is approved for use is our best shot today and tomorrow. We need to use the CrowdStrike outage as the perfect example of future challenges, not a passing one-off.”
Maintaining the code signing chain of trust can help organizations prevent unauthorized code execution, while also scaling their operations to keep up with developer use of AI and open source technologies.
“In a world where AI and open source are as powerful as they are unpredictable, code signing becomes a business’ foundational line of defense,” Bocek concludes. “But for this protection to hold, the code signing process must be as strong as it is secure. It’s not just about blocking malicious code – organizations need to ensure that every line of code comes from a trusted source, validating digital signatures against and guaranteeing that nothing has been tampered with since it was signed. The good news is that code signing is used just about everywhere – the bad news is it is most often left unprotected by security teams who can help keep it safe.”