The recently released 2026 State of DevSecOps report has illuminated a pressing issue in the intersection of software development and security, shedding light on a critical tension between development velocity and security assurance. As organizations rapidly embrace AI-assisted coding practices to boost their efficiency and innovation, many are neglecting to adequately manage software dependencies. This negligence is leaving their software supply chains alarmingly vulnerable to potential threats by malicious actors.
Data from the report reveals that a staggering 87% of organizations have deployed services that ultimately contain known vulnerabilities, which pose a significant risk of active exploitation. The issue encompasses 40% of all services currently operational. Among different programming environments, Java applications lead with a 59% vulnerability rate, followed by .NET and Rust environments. Alarmingly, about 10% of globally deployed services operate on end-of-life (EOL) runtime environments, with Golang being the most affected at 23% and PHP at 13%.
Furthermore, the report indicates that developers face challenges in timely maintenance of third-party dependencies, with the median dependency not receiving an update for as long as 278 days. This delay contributes to an alarming accumulation of unpatched security flaws, particularly in Java and Ruby environments where lag time is notably pronounced.
The findings also highlight a trend where half of the organizations are adopting new third-party libraries within just 24 hours of their release. This rapid assimilation carries inherent risks, as rapid updates can expose organizations to malicious supply chain packages. The report points out that 54% of JavaScript users and 55% of Python users are among those who install updates almost instantaneously. Such strategies can inadvertently pave the way for attacks, reminiscent of recent incidents involving malicious npm packages such as s1ngularity and Shai-Hulud.
The risks are not limited to application layers; threats also loom over cloud infrastructure. Approximately 32% of organizations are deploying public Docker images within a single day of their creation, while 12% employ public Amazon Machine Images (AMIs) in the same timeframe. This rapid deployment poses significant security challenges that could lead to exploitable vulnerabilities.
Additionally, the state of continuous integration and deployment (CI/CD) pipelines reveals substantial vulnerabilities. Even though all surveyed organizations employ GitHub marketplace actions, a concerning 71% do not pin these actions to a specific commit SHA. This oversight remains a glaring invitation for cybercriminals to inject malicious payloads through compromised workflow actions.
Amid these vulnerabilities, security teams are grappling with overwhelming alert fatigue. An analysis of the reported “critical” dependency vulnerabilities demonstrates that a mere 18% of these threats pose genuine danger when evaluated within a runtime context. For instance, an astonishing 98% of .NET vulnerabilities are ultimately downgraded in severity, while nearly half of PHP flaws maintain a critical status.
In light of these findings, the report advocates for comprehensive mitigation strategies to secure modern software development environments. Recommended strategies begin with recognizing and rectifying the adoption speed of third-party libraries. Implementing a 7-day update cooldown for new packages can significantly reduce the risk of installing malicious entities immediately upon release. Furthermore, organizations are encouraged to utilize trusted first-party Docker Hub tags to limit the risk of deploying compromised cloud images.
Another critical improvement involves pinning all versions of GitHub Action executions to full commit SHAs. This practice can effectively counteract the automatic updates of potentially compromised actions, shielding CI/CD pipelines from exploitation. Additionally, leveraging runtime context to adjust common vulnerability scoring system (CVSS) scores can dramatically reduce the volume of critical alerts, diminishing alert fatigue by over 80%.
Ultimately, the report emphasizes that organizations must strike a careful balance in managing the cadence of updates while ensuring ongoing security. By adopting strategies such as dependency cooldown periods and prioritizing vulnerabilities based on their real-world exploitability, development teams can maintain their agility without jeopardizing security initiatives.
In a rapidly evolving technological landscape, the findings of the 2026 State of DevSecOps report serve as a clarion call for heightened awareness and proactive measures in software development practices. Organizations are urged to heed these insights to fortify their security posture and safeguard their software supply chains in an age marked by relentless innovation and escalating threats.

