Our devs stopped reading security scan results entirely and I'm not sure I can blame them

Posted by Smooth-Machine5486@reddit | ExperiencedDevs | View on Reddit | 33 comments

The false positive rate on our scanner got bad enough that two engineering leads told me they'd started treating all output as noise. Real findings were getting closed at the same speed as obvious garbage because no one trusted the signal anymore.

The thing that makes this dangerous rather than just annoying is that the vulnerabilities don't stop existing when developers stop reading the reports. We had coverage. We just had zero attention directed at the results.

We've been going back and forth on whether the problem is the scanner configuration, the scanner itself, or whether we need something sitting above it to filter and correlate before anything reaches them. Tuning rules manually has been a whack-a-mole exercise so far.

The question I keep coming back to is whether this is a tooling problem or a culture problem.