Ninety-five percent of organizations are now using AI tools for software development. However, a significant security gap raises alarms: Only 24% conduct comprehensive IP, license, security, and quality evaluations of the AI-generated code.
This oversight, highlighted in our new report, "Navigating Software Supply Chain Risk in a Rapid Release World," can expose organizations' software supply chains to serious risks.
The report, based on research conducted by UserEvidence, compiles insights from 540 software security leaders and practitioners. It emphasizes that a resilient software supply chain extends beyond maintaining compliance. Organizations also need to proactively address vulnerabilities to minimize downtime, prevent data breaches, improve productivity, and increase development velocity.
Most organizations are embracing AI in development, yet robust security protocols for AI-generated code are largely absent. This can open the door to new attack vectors. While 76% of respondents check AI code for security risks, only about half evaluate it for quality issues (56%) or IP and license risks (54%). This means a mere 24% perform comprehensive IP, license, security, and quality evaluations for AI-generated code.
Organizations that are highly effective at tracking and managing open source dependencies are significantly more prepared (85%) to secure open source software compared to the overall average (57%).
Of the 294 respondents that perform automatic continuous monitoring, 60% report remediating critical software vulnerabilities within a day. In contrast, only 45% of the full respondent pool remediate critical software vulnerabilities within the same timeframe. This clearly shows that organizations without automatic continuous monitoring are at a significant disadvantage in protecting their software supply chain.
Validating Software Bills of Materials (SBOMs) from external suppliers dramatically improves an organization's ability to evaluate third-party software and respond to critical vulnerabilities. Among the 275 respondents that prioritize SBOM validation, 63% report being highly prepared to evaluate third-party software. Furthermore, 59% of this group typically respond to critical software vulnerabilities within one day.
Organizations with more compliance controls in place demonstrate greater efficiency in remediating critical software vulnerabilities. For instance, among the 272 respondents using at least three compliance controls, 49% remediate critical vulnerabilities within a day. This percentage rises to 54% for the 126 respondents utilizing at least four compliance controls.
To understand these challenges and explore effective strategies for securing your software supply chain, download the full report.
Oct 08, 2025 | 6 min read
Jun 03, 2025 | 3 min read
May 08, 2025 | 3 min read
Jan 23, 2025 | 6 min read
Jan 06, 2025 | 6 min read