

The rapid adoption of AI is fundamentally reshaping the software development landscape, driving an unprecedented surge in code generation speed. However, this acceleration has created a significant challenge for security teams: the AI velocity paradox. This paradox describes a situation where the benefits of accelerated code generation are being "throttled by the SDLC processes downstream," such as security, testing, deployment, and compliance, which have not matured or automated at the same pace as AI has advanced the development process.
This gap is a recognized concern among industry leaders. In Harness’s latest State of AI in Software Engineering report, 48% of surveyed organizations worry that AI coding assistants introduce vulnerabilities, and 43% fear compliance issues stemming from untested, AI-generated code.
This blog post explores strategies for closing the widening gap and defending against the new attack surfaces created by AI tooling.
The AI velocity paradox is most acutely manifested in security. The benefits gained from code generation are being slowed down by downstream SDLC processes, such as testing, deployment, security, and compliance. This is because these processes have not "matured or automated at the same pace as code generation has."
Every time a coding agent or AI agent writes code, it has the potential to expand the threat surface. This can happen if the AI spins up a new application component, such as a new API, or pulls in unvalidated open-source models or libraries. If deployed without proper testing and validation, these components "can really expand your threat surface."
The imbalance is stark: code generation is up to 25% faster, and 70% of developers are shipping more frequently, yet only 46% of security compliance workflows are automated.
The Harness report revealed that 48% of respondents were concerned that AI coding assistance introduced vulnerabilities, while 43% feared regulatory exposure. While both risks are evident in practice, they do not manifest equally.
The components that significantly expand the attack surface beyond the scope of traditional application security (appsec) tools are AI agents or LLMs integrated into applications.
Traditional non-AI applications are generally deterministic; you know exactly what payload is going into an API, and which fields are sensitive. Traditional appsec tools are designed to secure this predictable environment.
However, AI agents are non-deterministic and "can behave randomly." Security measures must focus on ensuring these agents do not receive "overly excessive permissions to access anything" and controlling the type of data they have access to.

Top challenges for AI application security
For development teams with weekly release cycles, we recommend prioritizing mitigation efforts based on the OWASP LLM Top 10. The three critical areas to test and mitigate first are:
We advise that organizations should "test all your applications" for these three issues before pushing them to production.
Here’s a walkthrough of a real-world prompt injection attack scenario to illustrate the danger of excessive agency.
The Attack Path is usually:
This type of successful attack can lead to "legal implications," data loss, and damage to the organization's reputation.
Here’s a playbook to tackle Prompt Injection attacks

Harness's approach to closing the AI security gap is built on three pillars:
Read more about Harness AI security in our blog post.
Looking six to 12 months ahead, the biggest risks come from autonomous agents, deeper tool chaining, and multimodal orchestration. The game has changed from focusing on "AI code-based risk versus decision risk."
Security teams must focus on upgrading their security and testing capabilities to understand the decision risk, specifically "what kind of data is flowing out of the system and what kind of things are getting exposed." The key is to manage the non-deterministic nature of AI applications.
To stay ahead, a phased maturity roadmap is recommended:
By focusing on automation, prioritizing the most critical threats, and adopting a platform that provides visibility, testing, and protection, organizations can manage the risks introduced by AI velocity and build resilient AI-native applications.
Learn more about tackling the AI velocity paradox in security in this webinar.


The cybersecurity landscape was rocked on December 3rd, 2025, by the disclosure of another critical remote code execution (RCE) vulnerability affecting React Server Components and Next.js applications. With CVSS scores of 10.0, the maximum severity rating, CVE-2025-55182 (React) and the related CVE-2025-66478 (Next.js, later marked as a duplicate) represent an immediate, severe threat to modern web applications. At Harness, we have comprehensive protections in Traceable WAF that were already shielding your applications from these vulnerabilities, even before the CVEs were created.
These vulnerabilities, discovered by security researcher Lachlan Davidson, strike at the heart of React's new server-side rendering architecture. The flaws exist in the React Server Components (RSC) "Flight" protocol, which handles data serialization and deserialization between the server and client. What makes these vulnerabilities particularly dangerous is their combination of the following critical characteristics:
The vulnerability stems from insecure deserialization in the RSC protocol's handling of incoming payloads. When a server receives a specially crafted, malformed payload, it fails to validate the structure correctly, allowing attacker-controlled data to influence server-side execution logic and execute arbitrary JavaScript code.
React Server Components:
Next.js (App Router):
Other affected frameworks:
The most important news: If you had Traceable WAF enabled, you were already protected against well-known exploits at this moment. Our advanced payload analysis engine was already defending against this vulnerability class through multiple existing rules that included:
This proactive protection demonstrates the value of comprehensive security rules that defend against entire vulnerability classes rather than just specific CVEs.
Following the disclosure, our security research team identified multiple possible exploitation techniques and developed additional specific detection signatures. The following signatures protect against the payload patterns characteristic of CVE-2025-55182 exploitation attempts across different components:
Ensure these two rules are set with the action Block
.png)
Beyond signature-based detection, Traceable's behavioral analysis identifies attempts to bypass detection or discover new attack vectors. Our anomaly detection engine monitors for:
Our security researchers at ASPEN Labs by Harness have developed an open-source tool to help organizations test whether their applications are vulnerable to CVE-2025-55182. This tool provides a safe, controlled way to verify if your React and Next.js applications are vulnerable.
Tool Repository: Github(https://github.com/aspen-labs/CVE-2025-55182-checker)
git clone https://github.com/aspen-labs/CVE-2025-55182-checker.git
cd CVE-2025-55182-checker# Install uv
curl -LsSf https://astral.sh/uv/install.sh | sh
# Test a specific endpoint
uv run check https://your-app.com
# Test multiple endpoints from a file
uv run check --file targets.txt.example -o vulnerable.txt
At Harness, our unique approach to security, where researchers function as both researchers and developers, enables rapid development of defences and response to vulnerabilities. Our security research team doesn't just analyze these vulnerabilities; they immediately evaluate and translate their findings into practical protections deployed across our WAF infrastructure.
This research-to-product pipeline means:
The disclosure of CVE-2025-55182 serves as a stark reminder of the evolving threat landscape facing modern web applications. As frameworks become more sophisticated, so do the attack vectors targeting them. Traceable by Harness WAF represents not just a response to today's threats, but a platform built for tomorrow's challenges.
Our commitment to our customers includes:
The critical nature of these vulnerabilities demands immediate action. Organizations running React Server Components or Next.js applications should:
CVE-2025-55182 represents one of the most severe vulnerability disclosures in recent memory for the JavaScript ecosystem. With their combination of ease of exploitation, widespread impact, and critical severity, these vulnerabilities pose an immediate threat to organizations worldwide.
Traceable by Harness WAF provides comprehensive, immediate protection against these vulnerabilities through multiple layers of defense, from signature-based detection to AI-powered behavioral analysis. While patching remains essential for long-term security, our WAF ensures your applications remain protected during this critical period.
At Harness, we understand that security is not just about responding to threats; it's about staying ahead of them. Our research-driven approach, combined with our advanced WAF capabilities, ensures that your applications remain secure not only against today's disclosed vulnerabilities but also against tomorrow's emerging threats.
Stay protected. Stay ahead. Choose Traceable by Harness WAF.
For more information about Traceable WAF protection against CVE-2025-55182, or guidance, contact our team at security@harness.io


Today marks a major milestone in our journey to deliver the industry’s first unified DevSecOps platform—one that empowers engineering and security teams to collaborate seamlessly and deliver software quickly and securely. Following the merger of Harness and Traceable, we’re proud to unveil our first major innovation as a combined company: Traceable Cloud Web Application and API Protection (WAAP). This solution is purpose-built to secure modern, cloud-native applications and APIs—wherever and however they run.
The merger of Harness and Traceable was driven by a shared vision: to unify security and software delivery within a seamless, AI-powered platform. Traceable Cloud WAAP is a powerful example of our unified vision in action. It delivers deep, context-aware protection for web applications and APIs—helping you detect threats earlier, respond faster, and enforce consistent, intelligent defenses across your entire stack.
In a world where software changes rapidly and threats evolve just as fast, siloed tools are no longer enough. Together, we are setting a new standard for how teams seamlessly develop, deliver and secure applications, enabling them to embed security at every stage of the software lifecycle—without slowing development.
Today’s applications are cloud-native, highly distributed, and powered by APIs that form the backbone of digital interaction. But while apps have evolved, many security solutions haven’t. APIs now account for over 70% of internet traffic, yet traditional WAAP products still focus on perimeter defenses—leaving the core of modern architectures vulnerable.
Attackers have adapted, exploiting APIs, abusing business logic, and evading static defenses. Legacy WAAP solutions were designed for a simpler time—when applications lived behind a static edge, and traffic was easier to inspect and control. But cloud-native applications are anything but static. They scale across multiple environments, communicate through ephemeral APIs, and change frequently as development teams release new features at high velocity.
Traditional WAAPs can’t keep up. They miss shadow APIs, overlook internal traffic, and struggle to detect business logic abuse or human-like bots. They also rely heavily on manual rule tuning and separate runtime protection from development workflows, creating unnecessary friction between security and engineering teams.
As a result, organizations are left with blind spots that attackers are quick to exploit. In today’s API-driven world, reactive, perimeter-based security is no longer enough.
Traceable Cloud WAAP unifies four critical security capabilities in a single, integrated solution:
But where it truly stands apart is in the depth of its context and intelligence.
Rather than depending solely on static signatures, Cloud WAAP analyzes behavior across users, APIs, and sessions in real-time. It understands how traffic is expected to behave—and intervenes when something deviates from the norm. This enables security teams to detect threats earlier, respond faster, and make decisions with greater confidence.
As environments grow more complex, a unified approach backed by deep context ensures consistent protection across your entire application ecosystem.
Built specifically for cloud-native environments, Traceable Cloud WAAP represents a strategic evolution in application protection for today’s API-first world. It delivers the deep visibility and operational agility that traditional WAAPs lack, ensuring modern applications remain secure as they scale, shift, and grow more complex.
Key capabilities include:

Real-Time Insights, Actionable Defense - Traceable Cloud WAAP provides deep, real-time visibility into application and API traffic. Instantly identify and respond to OWASP Top 10 threats, blocked attacks, and the most targeted services—all from a single, context-rich dashboard designed for modern, cloud-native environments.
Traceable is also designed for maximum deployment flexibility—integrating seamlessly with your environment, no matter how it’s built:
This combination of deep visibility, intelligent runtime protection, and flexible deployment empowers security teams to close visibility gaps, detect threats earlier, and enforce protection wherever modern applications and APIs live.
Speed and security shouldn’t be at odds. Traceable Cloud WAAP eliminates bottlenecks, enabling fast, uninterrupted development—while keeping protection always on.
Whether you’re securing API-driven microservices or hybrid environments across cloud and on-prem, Traceable protects what matters most: your data, your users, and your APIs.
In a world where applications constantly evolve, security must too. Traceable delivers the visibility, context, and adaptability needed to protect modern, dynamic environments from the inside out.
This launch is the first major innovation since Harness and Traceable joined forces—and it reflects our shared vision for a unified, AI-powered DevSecOps platform. Together, we help teams move faster, stay aligned, and defend what matters most.
From bot attacks and API abuse to DDoS threats, Traceable ensures your defenses scale with your apps—without slowing innovation.
Schedule a demo to see how Traceable protects your APIs, apps, and users in real-time.