Legit Security, the definitive application security posture management (ASPM) leader providing end-to-end visibility and protection across the entire software factory, today announced its latest research report, The 2025 State of Application Risk: An ASPM View of the Security of Software Factories. The report found significant risk in both applications and the factories that produce them, with many organizations challenged by inefficient AppSec testing, plus a lack of visibility into secrets exposure, AI risks, SDLC misconfigurations, and software supply chain security.
The 2025 State of Application Risk report, based on data from the Legit platform, reveals that, as software development has evolved, vulnerabilities in code are now only the tip of the iceberg, with risks in development pipelines, build servers, libraries, tools, and processes lurking beneath. The research also highlights that all application risk is not created equal, and with the right context, teams can better identify the highest risk areas that deserve their focus, such as toxic combinations that compound security issues.
Leveraging its powerful ASPM and visibility capabilities, Legit Security delivers data in this report that highlights the previous year’s risk findings and uncovers where application security risk lives in the modern development environment.
The report’s key findings include:
- There is significant risk throughout the application development infrastructure and processes, with 100% of organizations found to have high or critical risks in their development environments.
- Application security scanning is inefficient, with 78% of organizations having duplicate SCA scanners and 39% with duplicate SAST scanners that can result in the same vulnerability findings and equivalent or contradictory remediation advice.
- Secrets exposure is pervasive, with 100% of organizations having high or critical secrets exposed in their code, and 36% of secrets found outside of source code.
- GenAI is an emerging threat, with 46% of organizations using AI models in source code in a risky way, such as low-reputation LLMs, which could contain malicious code or payloads or exfiltrate data sent to them.
- Misconfigurations are rampant, with 89% of organizations having pipeline misconfiguration issues that could lead to breaches like the one CodeCov suffered.
- Developer permissions sprawl is a significant issue, with 85% of organizations showing least-privilege violations that could lead to an attack like the one LastPass recently experienced.
- Toxic combinations of risk – such as developers using GenAI without human code review enforced through branch protection, or secrets in repositories with external collaborators – are prevalent, and highlight where security teams should focus their energy.
From GenAI code to overly permissioned developers to secrets exposed in Jira tickets, organizations must protect their development environments from end-to-end. Legit Security’s report provides organizations with the insights they need to understand the risks embedded and enmeshed across the software factory, well beyond vulnerabilities in code, and steps they can take to reduce this risk.
To download the full report, visit https://info.legitsecurity.com/state-of-application-risk.

Legit Security Brings Business Context to AppSec Issues Prioritization and Remediation
Posted in Commentary with tags Legit Security on February 25, 2025 by itnerdLegit Security, the definitive application security posture management (ASPM) leader providing end-to-end visibility and protection across the entire software factory, today announced the launch of Legit context. By providing full context around both the application and the development environment, Legit’s ASPM platform empowers CISOs and their team to find, fix, and prevent the application vulnerabilities driving the greatest business risk.
The release of Legit context follows on the January 2025 release of root cause remediation, which enables customers to take one practical remediation step to address multiple AppSec issues.
Connecting the Dots to Drive Prioritization Based on True Business Impact
Developers and security teams spend significant time attempting to triage and fix vulnerabilities, but often lack insights into their business impact and exploitability. For instance, is a vulnerability a major problem simply because it has a high CVSS score, or are there additional factors, such as Internet exposure, presence of sensitive data, GenAI use, or external services, impacting risk? In other cases, issues can breach compliance or be part of mission-critical APIs. Organizations often miss true business-critical risk, and spend time escalating the wrong risk, which increases the strain on development teams, is costly, and slows down innovation.
Legit context provides organizations with the full picture by building an application catalog with context, such as use of sensitive data (e.g., PII, PHI), APIs, Internet exposure, GenAI use, compliance implications, and the overall role of the application for the business. As a result, security and development teams gain the insights they need to confidently prioritize – and deprioritize – remediation efforts. And all insights are delivered automatically by our AI-native, deep code-to-cloud analysis.
Key features and benefits include:
In addition to the new context capabilities, Legit also announced:
With Legit’s new capabilities, organizations gain a complete view of application risk, the context to both prioritize and remediate, and the ability to orchestrate DevSecOps processes to prevent issues in the future. For more information, visit the Legit blog.
Leave a comment »