- Resource Library
- Guides
- Survey Report: Use and Security of GenAI in Software Development
Survey Report: Use and Security of GenAI in Software Development
How are your peers addressing the use of GenAI in development? Our new survey sought to find out.
Legit conducted a comprehensive survey of over 400 security professionals and software developers from a wide range of industries, revealing valuable insights into how GenAI is being utilized today, the concerns and challenges surrounding its use, and how it will shape the future of software development.
Key findings include:
- 96% of security and software development professionals report that their companies use GenAI-based solutions for building or delivering applications.
- 84% of security professionals are concerned about using code assistants and cite unknown and/or malicious code as their primary concern.
- 98% believe that security teams need a better handle on how GenAI-based solutions are used in development.
- 95% of respondents predict that software developers will be more reliant on GenAI in the next five years, with none foreseeing reduced reliance.
Download Report
“We’re now able to inventory all our SDLC systems and security tools, view developer activity, and detect and remediate vulnerabilities across them fast.”
Head of DevSecOps
Pharmaceutical Company
“Legit helps us secure our CI/CD pipelines including tracking the security posture of our different teams and workspaces, addressing SDLC configuration drifts, and helping us apply security resources where it can help us most.”
VP of Security
Online Auction Marketplace
“Legit Security’s platform visualizes and analyzes our software pipelines quickly to help ensure security compliance with regulatory frameworks, as well as the unique compliance requirements of some of our large financial services partners.”
Principal Engineer
Financial Services
“Legit is providing us with visibility across the entire supply chain, which helps us minimize risk and raise analyst productivity.”
Deputy Chief Information Security Officer
Enterprise Software Vendor
"Using Legit we immediately got a very clear status of the security posture in our pipelines, and saw where we needed to focus to improve our security."
IT Security Lead
Financial Services
Schedule a Demo
Book a 30 minute demo including the option to analyze your own software supply chain, if desired.