New vulnerabilities are discovered in code faster than developers can fix them. ​
Even daily reprioritization cannot keep up with hourly code changes. Reachability changes with every code changes and reachability detection tools cannot keep up.​
Cornell University researchers proved that GPT4 can now generate exploits for 87% of vulnerabilities given its CVE description.​ Source
If an attacker can load and execute vulnerable code, it does not matter that a developer did not call that function. It’s reachable! Whole groups of malware use this technique to breach organizations.​
3/4th of open-source critical and high vulnerabilities are unfixed. A developer can’t fix them, VM tools ignore them and DevSecOp teams give them a pass.​