Critical Security Threats Emerge from AI in Software Supply Chain
April 07, 2025

Software security threats and DevOps risks are emerging in the AI era, according to the Software Supply Chain State of the Union 2025 from JFrog.


Source: JFrog(link is external)

The top security factors impacting the integrity and safety of the software supply chain include: CVEs, malicious packages, secrets' exposures, and misconfigurations/human errors. As an example, the JFrog Security Research Team detected 25,229 exposed secrets/tokens in public registries (up 64% YoY). The increasing complexity of software security threats are making it harder to maintain consistent software supply chain security.

"Many organizations are enthusiastically embracing public ML models to drive rapid innovation, demonstrating a strong commitment to leveraging AI for growth. However, over a third still rely on manual efforts to manage access to secure, approved models, which can lead to potential oversights," said Yoav Landman, CTO and Co-Founder, JFrog. "AI adoption will only grow more rapidly. Thus, in order for organizations to thrive in today's AI era they should automate their toolchains and governance processes with AI-ready solutions, ensuring they remain both secure and agile while maximizing their innovative potential."

Key Report Findings Include:

AI/ML Model Proliferation and Attacks are Growing

In 2024, more than 1 million new ML models were added to Hugging Face, with an accompanying 5x increase in malicious models, indicating AI and ML models are increasingly becoming a preferred attack vector for bad actors.

Manual Governance of ML Models is Increasing Risk

Most companies (94%) are using certified lists to govern ML artifact usage, however over one-third (37%) of those rely on manual efforts to curate and maintain their lists of approved ML models. This over-reliance on manual validation creates uncertainty around the accuracy and consistency of ML model security.

Limited Security Scanning Leaving Blind Spots

Alarmingly, only 43% of IT professionals say their organization applies security scans at both the code and binary levels, leaving many organizations vulnerable to security threats only detectable at the binary level. This is down from 56% last year — a sign that teams still have huge blind spots when it comes to identifying and preventing software risk as early as possible.

Critical Vulnerabilities Continue to Rise and be Mis-scored

In 2024, security researchers disclosed over 33K new CVEs, a 27% increase from 2023, surpassing the 24.5% growth rate of new software packages. This trend raises concerns as the growing number of CVEs increases complexity and pressure on developers and security teams, potentially hindering innovation. Meanwhile, JFrog Security found that only 12% of high-profile CVEs rated "critical" (CVSS 9.0-10.0) by government organizations justify the critical severity level they were assigned because they are likely to be exploited by attackers. This pattern is troubling due to a centralized and unchanged scoring methodology over time, which heightens the risk of false positives in assessments and contributes to developers experiencing "vulnerability fatigue."

"We uncovered a clear pattern by CVE scoring organizations to inflate scores and cause an unnecessary level of panic in the industry, sending developers scrambling on remediation efforts that often results in wasted cognitive and professional time," said Shachar Menashe, JFrog VP of Security Research. "When DevSecOps teams are forced to remediate vulnerabilities that aren't ultimately harmful, their everyday workflows are disrupted, which can lead to developer burnout and costly mistakes."

Methodology: The report combines insights from over 1,400 development, security and operations professionals across the US, UK, France, Germany, India and Israel, with developer usage data from JFrog's customers, alongside original CVE analysis by the JFrog Security Research team.

Share this

Industry News

June 05, 2025

Postman announced new capabilities that make it dramatically easier to design, test, deploy, and monitor AI agents and the APIs they rely on.

June 05, 2025

Opsera announced the expansion of its partnership with Databricks.

June 04, 2025

Postman announced Agent Mode, an AI-native assistant that delivers real productivity gains across the entire API lifecycle.

June 04, 2025

Progress Software announced the Q2 2025 release of Progress® Telerik® and Progress® Kendo UI®, the .NET and JavaScript UI libraries for modern application development.

June 04, 2025

Voltage Park announced the launch of its managed Kubernetes service.

June 04, 2025

Cobalt announced a set of powerful product enhancements within the Cobalt Offensive Security Platform aimed at helping customers scale security testing with greater clarity, automation, and control.

June 03, 2025

LambdaTest announced its partnership with Assembla, a cloud-based platform for version control and project management.

June 03, 2025

Salt Security unveiled Salt Illuminate, a platform that redefines how organizations adopt API security.

June 03, 2025

Workday announced a new unified, AI developer toolset to bring the power of Workday Illuminate directly into the hands of customer and partner developers, enabling them to easily customize and connect AI apps and agents on the Workday platform.

June 02, 2025

Pegasystems introduced Pega Agentic Process Fabric™, a service that orchestrates all AI agents and systems across an open agentic network for more reliable and accurate automation.

June 02, 2025

Fivetran announced that its Connector SDK now supports custom connectors for any data source.

June 02, 2025

Copado announced that Copado Robotic Testing is available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).

May 29, 2025

Sauce Labs announced the general availability of iOS 18 testing on its Virtual Device Cloud (VDC).