Thought Leaders
Why AI-Generated Code Is Breaking Your Vulnerability Management Model

AI code generators have done something that years of DevOps tooling never quite managed: they’ve made it possible to ship features in days that used to take weeks. The problem is that speed applies equally to the vulnerabilities.
Across my years in cybersecurity, I’ve watched organizations cycle through the same reactive pattern: discover a vulnerability, scramble to understand its scope, argue over who owns the fix, and remediate it weeks or months later. AI has not changed that pattern. It has accelerated it to a pace where the old model can no longer keep up. The industry average MTTR for critical CVEs is north of 60 days. AI-assisted development does not give you 60 days. It gives you a new codebase every sprint.
The Dependency Problem Is Now an AI Problem
Ninety-six percent of enterprise applications include open source components. Most were never rigorously vetted, just pulled from public registries because they worked and someone needed them that afternoon. Security teams have been losing ground on this for years, and AI coding assistants have turned a slow bleed into something much harder to control.
When a developer writes code manually, they make deliberate choices about dependencies. When an AI model generates code, it pulls from whatever it was trained on. That often means hallucinated packages, outdated versions, or components with known CVEs that the model had no reason to avoid. The code arrives looking clean. The risk is embedded in the dependency tree, several layers down, invisible to anyone not looking specifically for it.
I’ve sat in security reviews where teams were shocked to find a critical CVE in a transitive dependency of a package they approved months earlier. The package was fine. What it pulled in was not. That dynamic is now happening at machine scale, across hundreds of developers using AI tooling that has no concept of your organization’s security posture.
Scanning After the Fact Is Not a Strategy
The prevailing model for open source software security is scan-and-patch: run a scanner, triage the findings, assign tickets, and wait. That model has always been reactive, and in an AI-accelerated development environment, it is completely outpaced.
Scanners find problems after they are already in your code. The window between introduction and discovery is where your exposure lives. When AI is generating code at scale, that window gets wider and the volume of findings grows faster than any team can manually remediate. The result is a CVE backlog that expands indefinitely, prioritization that becomes guesswork, and developers spending 4 to 8 hours per vulnerability on work that produces zero business value.
Add the governance breakdowns that follow and the picture gets worse. Ownership of remediation is frequently unclear. Security flags a CVE, engineering calls it a configuration question, and operations calls it a code problem. I saw this pattern 20 years ago and it has not gone away. AI makes the consequences of that ambiguity significantly harder to absorb.
The Shift That Actually Works: Control What Goes In
The organizations getting ahead of this have stopped trying to scan their way to safety and started controlling what their developers and AI tools can consume in the first place. The mechanism is a curated, policy-governed catalog of open source components, built from source, continuously monitored, and served as a private internal registry that replaces direct pulls from public ecosystems like PyPI, npm, or Maven.
This approach shifts security left in the most literal sense. Vulnerabilities get blocked at the point of consumption, before they ever enter the build pipeline. Developers use the same tools they have always used. AI coding assistants resolve dependencies from the same governed source. The security team sets policy once, and that policy applies everywhere, including to code a model generated at 2 a.m. without any human reviewing it.
What This Looks Like in Practice
For security leaders working through this, a few things matter more than anything else:
- Define your approved component set before you scale AI adoption. If your AI coding tools are resolving dependencies from public registries, your approval process exists only on paper. Establish a governed internal registry, route everything through it, and require that components be built from source with verifiable provenance.
- Treat remediation as a managed process, not a ticket queue. The organizations staying ahead of CVE debt are not moving faster on manual remediation. They have removed manual remediation from the equation. When a community-approved patch is available, it gets rebuilt into the catalog automatically. Developers get the update the next time they pull. Nobody assigns a ticket. Nobody waits 60 days.
- Map your AI toolchain to your compliance obligations before you are forced to. I have watched teams build on AI tooling for months, only to hit a wall when a customer required FedRAMP alignment or SOC 2 evidence. Your curated catalog is also your compliance audit trail. SBOMs and provenance records should ship with every component, not get assembled retroactively under deadline pressure.
- Assign clear ownership at the governance layer, not the ticket layer. The teams that move fastest on remediation are not the ones with the most developers. They are the ones where the security team owns policy, the platform team owns delivery, and neither is waiting on the other to act.
Security That Enables Rather Than Blocks
There is a persistent belief that security and development velocity are in fundamental conflict. I have never found that to be true when security is designed into the process rather than bolted onto it. Developers working from a curated component set actually move faster, because they are not second-guessing approvals, waiting on security reviews, or cleaning up vulnerabilities that could have been blocked upstream.
The organizations that will navigate AI-driven development without accumulating unsustainable security debt are not the ones running the most scanners. They are the ones that have made a deliberate decision to govern what enters their software supply chain before it becomes an incident response problem. That decision belongs to leadership. The tools to execute it exist today.












