Remediation at Scale: What High-Performing AppSec Teams Do Differently

An analysis of SAST and SCA vulnerability remediation patterns across 50,000+ actively developed repositories and 400+ organizations.

  • 2.4x higher SAST fix rate among top-performing AppSec teams
  • 3.3x higher SCA fix rate among top-performing AppSec teams
  • 9x faster mean time to remediate when findings are caught in PR review
  • 50k+ active repositories analyzed across 400+ organizations

Every organization in this dataset uses security scanning tools. The gap between top performers and everyone else isn't detection. It's what happens after a finding surfaces. We analyzed anonymized remediation data from 400+ Semgrep-enabled organizations across the full 2025 calendar year, segmenting them into two cohorts: Leaders (top 15% by fix rate) and the Field (the remaining 85%). The performance gap holds across every severity level, vulnerability class, and package ecosystem.

This report breaks down what Leaders do differently: which capabilities they configure, when fixes happen, what ages into permanent backlog risk, and where most remediation programs break down.

Your privacy matters to us. By submitting this form, you agree to our Privacy Policy

What's in the AppSec Remediation Benchmark Report?

What is a good SAST fix rate and how does yours compare?

Fix rate and mean time to remediate (MTTR) benchmarks across Leaders and the Field, broken down by SAST, SCA, and severity level. Use these numbers to assess where your vulnerability program stands.

Does catching vulnerabilities earlier actually improve remediation rates?

PR-detected findings resolve 9x faster than findings caught in full scans. This section quantifies the shift-left effect, identifies where the developer context advantage is largest, and measures fix rate lift across blocking rules, cross-file taint analysis, SCA reachability data, and custom rules. Leaders and the Field have access to the same features. How they use them is not the same.

Which vulnerability classes are hardest to remediate?

OWASP Top 10 and CWE-level fix rate breakdowns show where remediation stalls and why. Authentication failures and cryptographic failures show the largest performance gaps, not because teams ignore them, but because they're genuinely harder to fix.

How long before a vulnerability finding is too old to fix?

Findings that age past 90 days are significantly less likely to ever be resolved through normal workflow. This section identifies which OWASP categories and CWEs are most likely to sit in backlogs indefinitely, and what high-performing teams do before they reach that threshold.

Frequently asked questions about SAST and SCA vulnerability remediation