Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Beyond SAST and DAST: A Unified Security Testing Architecture for Autonomous Coding Agents

View through CrossRef
Autonomous coding agents-AI systems that independently write, review, commit, and deploy software-have introduced a class of security vulnerabilities that existing application security testing methodologies cannot detect. Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), the twin pillars of modern secure development lifecycles, were designed under a foundational assumption: human developers author code, and the development pipeline consists of discrete, human-initiated events. Agentic AI systems invalidate both assumptions. This paper argues that SAST and DAST must be fundamentally reinvented, not incrementally extended, to address the threat landscape of agentic code generation. We demonstrate this gap through analysis of a representative supply chain attack vector-the adversarially poisoned AI-suggested dependency-which evades all major SAST and DAST controls by exploiting the trust model of the agent rather than the syntax or runtime behavior of the generated code. We present three contributions: (1) the Agentic Vulnerability Taxonomy (AVT), classifying vulnerability classes unique to or amplified by agentic coding pipelines across five dimensions; (2) the Agentic Risk Scoring Model (ARSM), a quantitative framework extending CVSS 3.1 with four agent-specific dimensions; and (3) the Unified Agentic Security Testing (UAST) architecture, a redesigned security testing pipeline integrating static, dynamic, behavioral, and provenance-aware analysis into a continuous, agent-aware feedback loop. These contributions are aligned with NIST AI RMF [1], ISO/IEC 42001 [2], and OWASP guidance on LLM application security [3].
Elsevier BV
Title: Beyond SAST and DAST: A Unified Security Testing Architecture for Autonomous Coding Agents
Description:
Autonomous coding agents-AI systems that independently write, review, commit, and deploy software-have introduced a class of security vulnerabilities that existing application security testing methodologies cannot detect.
Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), the twin pillars of modern secure development lifecycles, were designed under a foundational assumption: human developers author code, and the development pipeline consists of discrete, human-initiated events.
Agentic AI systems invalidate both assumptions.
This paper argues that SAST and DAST must be fundamentally reinvented, not incrementally extended, to address the threat landscape of agentic code generation.
We demonstrate this gap through analysis of a representative supply chain attack vector-the adversarially poisoned AI-suggested dependency-which evades all major SAST and DAST controls by exploiting the trust model of the agent rather than the syntax or runtime behavior of the generated code.
We present three contributions: (1) the Agentic Vulnerability Taxonomy (AVT), classifying vulnerability classes unique to or amplified by agentic coding pipelines across five dimensions; (2) the Agentic Risk Scoring Model (ARSM), a quantitative framework extending CVSS 3.
1 with four agent-specific dimensions; and (3) the Unified Agentic Security Testing (UAST) architecture, a redesigned security testing pipeline integrating static, dynamic, behavioral, and provenance-aware analysis into a continuous, agent-aware feedback loop.
These contributions are aligned with NIST AI RMF [1], ISO/IEC 42001 [2], and OWASP guidance on LLM application security [3].

Related Results

The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
An Effective Framework
An Effective Framework
Software-Defined Networking (SDN) is an advanced network architecture that separates the control plane from the data plane, enhancing scalability, flexibility, and efficiency. Howe...
Eyes on Air
Eyes on Air
Abstract We at ADNOC Logistics & Services have identified the need for a Fully Integrated Inspection and Monitoring Solution to meet our operational, safety and ...
Model to reduce DevOps Pipeline execution time using SAST
Model to reduce DevOps Pipeline execution time using SAST
Abstract Static code analysis (SAST is a well-known concept) to identify security flaws in the code to improve software product quality. A SAST tool called SonarQube which ...
Architecture between heteronomy and self-generation
Architecture between heteronomy and self-generation
Introduction «I have never worked in the technocratic exaltation, solving a constructive problem and that’s it. I’ve always tried to interpret the space of human life» (Vitto...
Crystal growth, quality characterization and THz properties of DAST crystals
Crystal growth, quality characterization and THz properties of DAST crystals
4‐N, N‐diethylamino‐4’‐N’‐methyl‐stilbazolium tosylate (DAST) crystals were grown by slope nucleation method (SNM). The crystal structure of grown DAST crystals was characterized b...
Developing and Accessing Validity and Reliability of the Persian Versions of Three Instruments Measuring Risky Sexual Behaviors
Developing and Accessing Validity and Reliability of the Persian Versions of Three Instruments Measuring Risky Sexual Behaviors
Objectives: There are a few instruments available to assess sexual issues in Persian according to indigenous culture. This study aims to translate three instruments of Sexual Addic...

Back to Top