The security industry has been promising a shift left for the better part of a decade. The premise is straightforward: vulnerabilities caught in development are orders of magnitude cheaper to fix than vulnerabilities caught in production. If you can move security earlier in the software development lifecycle, you reduce both the cost of remediation and the risk of a breach.
The premise is correct. The execution has been, for the most part, disappointing. The developer security tools that emerged in the first wave of shift-left investment were designed by security professionals for security professionals, not for the developers who were supposed to use them. They produced enormous volumes of findings with minimal context, interrupted developer workflows at the worst possible moments, and created a cultural antagonism between security and engineering teams that persists in many organizations today.
But a second wave of developer security tooling is emerging, built by companies that understand both security and developer experience. At DeepDots Ventures, we have been watching this space closely, and we believe the next three to five years will produce several category-defining companies at the intersection of security and developer tools.
The Alert Fatigue Problem
The central failure mode of first-wave developer security tooling is alert fatigue. Static application security testing (SAST) tools, software composition analysis (SCA) tools, and container image scanners are all capable of producing enormous numbers of findings per scan. Organizations that deploy these tools naively discover that their pipelines are blocked by hundreds of findings per week, that most of the findings are either false positives or low-severity issues, and that developers quickly learn to dismiss or bypass security findings to get their work done.
Alert fatigue is not merely an inconvenience. It actively degrades security posture, because developers who are trained to ignore security findings will eventually ignore a critical one. The tools that cause alert fatigue are, in this sense, worse than no tooling at all — they create a false sense of security coverage while providing minimal actual security benefit.
Solving the alert fatigue problem requires more than better tuning of existing scanners. It requires a fundamental rethinking of how security findings are presented to developers. The best second-wave tools we are seeing apply risk-based prioritization — surfacing only the findings that are both high-severity and reachable in the specific application context — and provide clear, actionable remediation guidance in the developer's existing workflow, without requiring the developer to understand the underlying security concepts in depth.
Supply Chain Security: The New Frontier
The software supply chain attacks that became public in 2020 and 2021 — most prominently the SolarWinds breach and the Log4Shell vulnerability — shifted the entire software security conversation. The realization that a widely-used open source library or a trusted software vendor could be a vector for catastrophic attack forced organizations to confront the complexity and opacity of their software supply chains.
Software composition analysis — the practice of inventorying all open source dependencies and checking them against known vulnerability databases — was already a growing market before these incidents. After them, it became urgent. The SBOM (Software Bill of Materials) concept moved from a NIST recommendation to an executive order requirement in a matter of months.
But SCA as practiced today has limitations. Vulnerability databases like the National Vulnerability Database have significant coverage gaps and latency — newly discovered vulnerabilities may not appear in the database for days or weeks. Reachability analysis — the ability to determine whether a vulnerable code path in a dependency is actually called by the application — is technically challenging and often absent from commercial SCA tools. And the explosion of indirect (transitive) dependencies in modern JavaScript, Python, and Java applications means that the dependency graphs that SCA tools must analyze are enormous and complex.
We are investing in companies that are advancing the state of the art in supply chain security beyond basic SCA, including behavioral analysis of dependency activity, improved reachability analysis, and runtime supply chain monitoring that can detect attacks in progress rather than just known vulnerabilities.
Secrets Management in the Developer Workflow
Secrets sprawl — the proliferation of API keys, credentials, and tokens in source code, configuration files, CI/CD pipelines, and cloud environments — is one of the most common sources of security incidents in modern software organizations. The 2023 GitHub leak detection report found that more than ten million secrets were detected in public GitHub repositories during the year. The number of secrets in private repositories is presumably far larger.
The fundamental problem is that secrets management is friction in the developer workflow. Developers who need to connect their application to a database, an API, or a cloud service take the path of least resistance — which is often to paste the credential directly into the code or configuration file. Formal secrets management solutions like HashiCorp Vault or cloud provider secret stores are more secure but require additional steps that developers under time pressure often skip.
The product opportunity here is to make the secure path the easy path. Tools that automatically detect and rotate leaked secrets, inject secrets into the development environment without requiring developers to handle them explicitly, and provide visibility into secrets usage across the organization are all areas where we see significant product and commercial potential. The total addressable market is every organization that writes software — which makes this one of the largest untapped markets in developer security.
AI-Generated Code and the Security Implications
The rapid adoption of AI coding assistants has introduced a new dimension to the developer security problem. Research has shown that AI code generation tools, including GitHub Copilot and similar products, produce vulnerable code with measurable frequency. The vulnerabilities tend to fall into well-known categories — SQL injection, cross-site scripting, buffer overflows — that pattern-based scanners are effective at detecting, but the volume of AI-generated code is growing faster than security review capacity.
The intersection of AI code generation and security tooling is one of the most active areas of product development we are tracking. AI-powered security review that provides real-time feedback on AI-generated code, in the same IDE context where the code is written, is a category that did not exist three years ago and is now populated by a growing number of well-funded startups. We believe this category will produce at least one very large company over the next five years.
There is also a more philosophical question about whether AI coding assistants will ultimately improve or degrade the overall security of the code they help produce. The optimistic case is that AI assistants, properly trained and incentivized, will consistently choose secure implementations over insecure ones, effectively encoding security best practices into every line they write. We believe this outcome is achievable and that the companies driving it — building security-aware AI coding tools — are among the most interesting investments in the developer tools space today.
The DevSecOps Cultural Challenge
Even the best security tooling will fail if the organizational culture resists it. The DevSecOps movement — integrating security practices into DevOps workflows rather than treating security as a separate gate — has made genuine progress in changing how engineering and security teams relate to each other, but the cultural transformation is far from complete in most organizations.
The engineering leaders we work with describe a consistent challenge: security requirements feel like external constraints imposed by a separate team rather than shared goals owned by everyone. Security teams, for their part, describe frustration at being consulted late in the development process and blamed when vulnerabilities make it to production despite the process constraints they operate under.
The product implication of this cultural reality is that developer security tools must earn adoption through developer trust, not organizational mandate. Tools that developers choose to use because they provide genuine value — faster feedback, clear guidance, reduced cognitive load — will achieve the adoption and effectiveness that tools deployed through compliance mandates rarely achieve.
Our Investment Perspective
Developer security is one of our highest-conviction investment themes at DeepDots Ventures. The market is large, the existing solutions are widely perceived as inadequate by both developers and security professionals, and the pace of new threat vectors — supply chain attacks, AI-generated vulnerabilities, secrets sprawl — is creating urgency that was previously absent from enterprise security purchasing decisions.
We specifically focus on companies that have built security products that developers actually want to use — products that improve developer experience even as they improve security posture. The companies that crack this combination will build very large, defensible businesses, and we are actively seeking founders working at this intersection. Reach out to discuss your vision.
Key Takeaways
- Alert fatigue from first-wave security tools is a bigger security problem than having no tools at all.
- Software supply chain security has moved from best practice to urgent requirement in most enterprises.
- Secrets sprawl is one of the most common and underaddressed security failure modes in modern software organizations.
- AI-generated code requires new approaches to security review that operate at AI generation speed.
- Developer security tools that earn adoption through developer trust outperform tools deployed through compliance mandates.