Blog
Deep dives into application security, tool comparisons, and industry insights. Learn from our security research and vulnerability analysis across open-source projects.
10 min read
Jost
When SOC 2 Type II Compliant Means Anyone Can Read Your Source Code
SOC IILovable breachVulnerabilitiesSecuritySAST
Lovable spent 2025 turning security into a brand. Then a free account read everyone's chats, credentials, and code. Their response: That is intentional behaviour.
Read Article
11 min read
Jost
Your "Won't Fix" Backlog Just Became a Zero-Day Catalogue
MythosProject GlasswingDefence in DepthExploit ChainingVulnerability backlogRealVuln
Anthropic's Mythos weaponised the "Won't Fix" backlog. Here's why chain disruption and not faster patching is the only defence that scales.
Read Article
11 min read
Jost
Vibe Coding Is Safe for Production When You Do These 6 Things
Vibe CodingAI SecurityProductionApplication SecurityCI/CD
Six things make vibe coding production-ready: secret scanning, dependency verification, API-level auth testing, semantic analysis for business logic, automated scanning on every push, and security headers. Here's exactly how to set each one up.
Read Article
11 min read
Jost
We Ran 15 Security Scanners Against Real Vulnerabilities. The Results Aren't Pretty
SASTSecurity BenchmarkCode ScanningLLM SecurityApplication Security
We tested 15 security scanners on 796 real vulnerabilities in 26 Python repos. SAST tools like Semgrep and Snyk caught less than 18%. LLMs like Claude Sonnet 4.6 caught 50%. Kolega.Dev caught 81%. All data, scoring code, and results are open-source at realvuln.kolega.dev.
Read Article
7 min read
Jost
The 8 Most Common Vulnerabilities in AI-Generated Code
AI SecurityVibe CodingVulnerabilitiesSASTApplication Security
45% of AI-generated code fails security tests. These 8 vulnerability patterns keep shipping in vibe-coded apps - and your SAST tools miss most of them.
Read Article
11 min read
John
Your Security Scanner Was the Weapon: The TeamPCP Supply Chain Attack
supply chain securityCI/CDDevSecOpsopen source
On March 19, a routine Trivy scan stole your cloud credentials. Here's the full TeamPCP attack chain, why every detection tool missed it, and what to fix today.
Read Article
11 min read
Jost
Y Combinator Just Celebrated Building a Generation of Insecure Startups. Nobody Noticed.
YC Y CombinatorDemo DayVibe codingAI security AI-generated codeapplication securitySAST
Demo Day celebrated 95% AI-generated codebases. But 45% of AI code fails security tests, and traditional SAST can't catch it. Here's the math they skipped.
Read Article
13 min read
Jost
We Needed a Benchmark That Didn't Exist. So We Built One.
SecurityCybersecuritySoftware EngineeringOpen SourcePython
There’s a question nobody in security tooling answers cleanly: how do you know your tool would actually catch real-world vulnerabilities?
Read Article
5 min read
Jost
You Can't Secure OpenClaw. You Can Secure Yours.
OpenClawSecure CodeSecurity PostureCode Vulnerabilities
This started as a mission to fix agentic AI security. It ended somewhere I didn't expect.
Read Article
12 min read
Faizan
kolega.dev - OWASP Benchmark Results
OWASP Benchmark Kolega.devSAST Comparison AI Security Vulnerability Detection
We scored +87.4% on OWASP's industry-standard security benchmark — more than 2x higher than the next best tool. Here's the full breakdown with methodology and raw results.
Read Article
10 min read
Jost
We Tested Snyk's Own Demo Repo. Their Scanner Found Nothing.
SAST comparisonSnykSonarCloudAikidoScala securityVulnerability detectionscanner benchmarks
Snyk built a vulnerable Scala app to show off their security scanner. We ran it through five tools. Only one found the planted vulnerability. It wasn't Snyk.
Read Article
8 min read
Jost
Control Drift: Why Your SOC 2 Compliance Can't Keep Up With AI Written Code
SOC 2complianceAI-generated codeSASTcontrol driftapplication security
When SAST tools generate 87% noise and miss the critical vulnerabilities entirely, your SOC 2 audit trail only proves you ran a process - not that your code is secure. The gap between compliance paperwork and actual security is widening at AI speed, and the breaches have already started.
Read Article
10 min read
Jost
How We Got a 90% Fix Rate on Open Source Security Reports
vulnerability researchsemantic code analysisapplication securityopen source securityautomated remediation
Most automated security reports get ignored. We got 90.24% of ours accepted by doing what most tools skip: actually reading the code, understanding the architecture, and submitting fixes specific enough to merge without back-and-forth
Read Article
13 min read
Jost
Vibe Coding Is a Security Disaster That Is About to Happen
vibe codingapplication securityAI generated codesoftware vulnerabilitiesVibe Coding 1st Birthday
Millions of programmers send out code that they don't understand. 40% to 62% of it has security holes that can be used. The breaches have already begun.
Read Article
9 min read
Jost
The 87% Problem: Why Traditional Security Tools Generate Noise
SASTFalse PositivesAlert Fatigue Application SecuritySemantic Analysis
Traditional SAST tools have an 87% false positive rate - we proved it across 10 repositories and 1,183 findings. Meanwhile, real vulnerabilities slip through because pattern matching can't understand what code actually does.
Read Article
7 min read
Jost
The SQL Injection That SAST Didn't Find
NocoDBsemantic analysisapplication securitySQL injectionSAST comparison
Semgrep scanned NocoDB and flagged 222 issues but missed the critical SQL injection in the Oracle client - 17 injection points across one file, invisible to pattern matching because the code sat inside a query builder context. It's the clearest example of why semantic analysis catches what SAST can't.
Read Article
10 min read
Kolega.dev Team
The Hidden Risks of Modern Code: Security Patterns Modern Tools Still Miss
code securitymodern development securitysemantic analysissecurity tool comparisonautomated security validationKolega.dev
Development velocity has never been higher, yet security often trails behind. In every major project we assessed, we identified significant vulnerabilities that conventional security tools simply overlooked.
Read Article
9 min read
Jost
Why Most Security Alerts Are Noise (And How to Fix It)
SASTFalse PositivesAlert FatigueApplication SecurityDevSecOpsSemantic AnalysisSecurity Automation
Your SAST tool found 120 problems. Your team spent 20 hours sorting things out. You fixed 15 real problems. This is the problem of alert fatigue, but there is a way to fix it.
Read Article
12 min read
Jost
What We Found: 225 Vulnerabilities in 45 Open Source Projects
vulnerability researchsemantic code analysisapplication securityopen source securitySQL injectionrace conditionsauthentication bypassSAST comparisonKolega.dev
We used kolega.dev on 45 open source projects. These weren't just random GitHub repos; but mature projects, worked on and used by real users. Langfuse, Qdrant, NocoDB, Phase, Cloudreve, Agenta and Weaviate are all examples. We found 225 security holes in those 45 projects. So far, maintainers have reviewed 41 of our reports. Over 90% fix acceptance rate.
Read Article
15 min read
Jost
The 7 Best Code Security Solutions for 2026: Why Scanning the Old Way Isn't Enough
SAST tools 2026static analysis comparisonbest SAST solutionKolega.devSemgrep alternativeapplication securityvulnerability detectioncode security platform
Your SAST tool found 1,183 problems. There are only 153 real ones. There is a better way.
Read Article