2025 State of Code Security: Key Trends and Risks

Explore the key insights on code and cloud security risks shaping 2025.

2 분 읽기

In cloud-native environments, the security of your code repositories and development pipelines is critical. The 2025 State of Code Security Report sheds light on the most pressing risks and trends facing organizations today. By analyzing hundreds of thousands of repositories across platforms like GitHub, GitLab, and Azure DevOps, Wiz Threat Research uncovers key risks and misconfigurations that impact production code development and production environments. 

A Data-Driven Lens on Security 

To produce this report, our researchers leveraged data collected throughout 2024 using the Wiz Cloud and Wiz Code platforms. With insights directly derived from real-world code repositories, version control systems (VCS) platforms, and CI/CD pipelines, this research provides an actionable look at code-driven security challenges. By connecting code development platforms to cloud environments, we've ensured that results capture the full scope of risks, from code origin to the deployment stage. 

Key Findings from the Report 

1. GitHub Repositories: A Prime Target 

GitHub’s popularity makes it a central hub for developers—but also for attackers. Alarmingly, 35% of GitHub repositories are public, providing malicious actors with easy access to exploits if developers make critical mistakes, such as accidentally committing sensitive credentials. This reinforces the need for stricter permissions and better repository management practices. 

2. Alarming Secrets Exposure  

61% of organizations have public repositories containing cloud secrets, like API keys and access tokens. In a worst-case scenario, something as simple as a leaked AWS access key could lead to data exfiltration, financial losses, and reputational damage. The importance of keeping secrets encrypted and stored in dedicated secret management tools cannot be overstated. 

 

3. Vulnerability Risks amid usage of Self-Hosted Runners 

Self-hosted CI/CD runners are a convenient solution, but they come with high risks. About 35% of enterprises use non-ephemeral self-hosted runners, which increases the risk of attackers gaining lateral movement across repositories and organizations. Even worse, environments hosting these runners often suffer from poor maintenance hygiene, leaving them exposed to high-impact vulnerabilities. VMs with runners have on average 3 times more software packages installed and High / Critical vulnerabilities than other VMs. 

 

4. Dangerous and powerful scopes 

Third-party GitHub Apps streamline workflows but often expose organizations to unnecessary risk. pull_requests and contents scopes are assigned to over 76% of organization level Apps. But this does not stop here - a concerning 80% of Apps with the pull_requests scope grant write access, allowing for direct modifications to repositories. Misuse of such permissions—whether by a malicious or a hijacked App or through a supply chain attack—can lead to significant compromises in code integrity. 

Get the full picture 

The data is clear: unmanaged risks in code and version control systems present significant challenges for the modern enterprise. From alarming levels of secrets exposure to insecure CI/CD workflows, these vulnerabilities jeopardize production environments. 

Want to explore all the findings in detail and learn actionable strategies to protect your organization?

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자