Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DevSecOps with Agentic AI: Autonomous Security Testing in CI/CD Pipelines

    DevSecOps with Agentic AI: Autonomous Security Testing in CI/CD Pipelines

    June 2, 2025

    Table of Contents

    1. AI Agents in DevOps and Security
    2. Strengthening Security in DevSecOps with Agentic AI
    3. How Does Agentic AI Strengthen CI/CD Pipelines?
    4. Future Impact of AI Agents on DevSecOps Practices
    5. How does Tx Help You Streamline DevSecOps Pipeline with Agentic AI?
    6. Summary

    The new digital era is powered by Artificial Intelligence Solutions, which brings endless possibilities and innovative opportunities. It all started with early AI trends like LLMs, which are drastically reshaping our digital ecosystem. Metaverse, Autonomous Vehicles, VR gaming, and GenAI are just some examples of AI’s influence on our lives. As businesses were shifting to AI-first strategies, there came the new update, “Agentic AI.” It is enabling enterprises to make autonomous decisions and transform how they approach DevOps and security, or DevSecOps.

    AI Agents in DevOps and Security

    Agentic AI in DevSecOps enables autonomous, goal-driven AI agents to secure, optimize, and manage DevOps and security pipelines. Instead of embedding security into DevOps, Agentic AI takes initiative, facilitates decision-making, and coordinates tasks across tools and teams. It helps DevSecOps evolve from rule-based automation to intelligent orchestration. Agentic AI can continuously monitor logs, network traffic, and runtime behavior.

    Unlike traditional automation, Agentic AI proactively detects security issues, assesses risk, and takes suitable actions with minimal human supervision. AI agents can run security tests based on context, enforce compliance, and respond to real-time incidents. Enterprises can significantly improve the speed and consistency of their security operations across CI/CD pipelines. By combining autonomy and intelligence with DevSecOps workflows, AI Agents can enable continuous and adaptive security. They can function as goal-driven security agents to reduce manual work, accelerate remediations, and make security an integral part of the entire SDLC.

    Strengthening Security in DevSecOps with Agentic AI

    Strengthening Security in DevSecOps

    Agentic AI brings a brand-new security approach to DevSecOps. It seamlessly collaborates with vulnerability scanners to automatically detect and resolve security issues before escalating them into production. By Leveraging AI Agents, Enterprises can automate routine tasks like vulnerability patching and reduce the time needed for incident detection and resolution. Here’s how Agentic AI strengthens security in DevSecOps:

    Built-In Security with Autonomous Agents:

    Agentic AI embeds security directly into development workflows, making it a core component rather than an add-on. Autonomous agents continuously monitor systems and execute policies, ensuring compliance without disrupting productivity.

    Continuous Risk Detection and Assessment:

    Instead of relying on periodic scans, agentic AI performs real-time vulnerability assessments using models trained on security data. These agents also detect anomalies early, flagging threats before they become critical.

    Instant Response and Adaptive Defense:

    Agentic AI enables immediate responses to incidents, such as isolating compromised systems during a breach. These agents refine their strategies through continuous learning, helping organizations adapt to emerging threats effectively.

    How Does Agentic AI Strengthen CI/CD Pipelines? 

    Function 

    Description 

    Tools & Technologies Leveraged 

    Proactive Security Integration 

    Agentic AI integrates security checks at every CI/CD stage, ensuring early vulnerability remediation. 

    Checkmarx, SonarQube, GitHub Actions Security Rules. 

    Context-Aware Testing and Scanning 

    Triggers targeted scans based on risk context, reducing unnecessary test cases when handling security. 

    Synk, OWASP ZAP, GitLab CI with conditional jobs. 

    Autonomous Decision-Making and Adaptation 

    Based on current risks, make decisions during the pipeline (e.g., pause builds and adjust workflows). 

    Open Policy Agent (OPA), Jenkins Pipelines with AI plugins. 

    Real-time Incident Handling 

    Detects incidents in real-time and takes immediate action, like isolating systems and notifying teams. 

    Falco, AWS Lambda for auto-remediation. 

    Intelligent Tool Orchestration 

    Coordinates multiple tools intelligently, selecting the best one based on task and context. 

    Kubernetes Operators, Terraform Cloud. 

    Continuous Compliance Monitoring 

    Monitors security and compliance rules continuously, preventing violations before deployment. 

    HashiCorp Sentinel, AWS Config Rules, Prisma Cloud. 

    Increased Speed and Efficiency 

    Automates repetitive tasks and optimizes pipelines, reducing development and deployment times. 

    CircleCI, Azure DevOps, Harness.io. 

    Future Impact of AI Agents on DevSecOps Practices

    Impact of AI Agents

    Greenfield Projects:

    When developing new software, AI agents can accelerate the development cycle by generating initial code staging, implementing cloud infrastructure using Infrastructure as Code (IaC), and recommending architectural patterns based on project goals. These agents can also execute security best practices from the start, such as secure configurations and dependency management. This will make “secure by design” more achievable from day one.

    Brownfield Environments:

    In legacy systems, AI agents can analyze outdated codebases to detect outdated libraries, hardcoded secrets, and unpatched vulnerabilities. They can assist in refactoring by identifying technical debt and suggesting modernization paths. Additionally, agents can help containerize legacy applications, convert monoliths to microservices, and reduce manual migration overhead.

    Application Modernization:

    AI can streamline the application modernization process by automating the identification of outdated APIs, mapping service dependencies, and recommending cloud-native alternatives. It can support enterprises in containerization, migration to serverless platforms, and decoupling of tightly integrated components. By automating regression testing and updating CI pipelines, agents reduce risk during modernization while improving deployment velocity.

    Continuous Integration and Continuous Delivery (CI/CD):

    AI agents enhance CI/CD by dynamically adjusting build and test workflows based on code changes, risk levels, and historical trends. They can identify flaky tests, predict deployment failures, and reroute workflows for optimal efficiency. Over time, these agents learn from pipeline performance and adapt to reduce bottlenecks, increase test coverage intelligently, and shorten feedback loops.

    Security Testing and Remediation:

    AI agents elevate security testing by integrating real-time SAST/DAST scans based on the nature of the code changes, not just fixed schedules. They can prioritize vulnerabilities by context (e.g., reachable from external interfaces), suggest fixes based on learned patterns, and even generate secure patches for known issues. This proactive and contextual security handling reduces developer fatigue and shortens remediation time.

    Incident Response:

    During incidents, AI agents can correlate signals from various sources, such as logs, metrics, and user behavior, to detect threats early and determine their scope. They can execute predefined runbooks or dynamically assemble responses. Post-incident agents assist in root cause analysis and update monitoring, or detection rules based on what was learned.

    How does Tx Help You Streamline DevSecOps Pipeline with Agentic AI?

    Integrating security into fast-paced development workflows becomes critical and complex as businesses accelerate digital transformation. Tx addresses this challenge by combining its deep expertise in DevSecOps with the emerging power of Agentic AI to streamline and secure the entire CI/CD pipeline.

    We leverage our proprietary accelerator, Tx-DevSecOps, to seamlessly embed security into your development lifecycle. This tool automates security testing, including Dynamic Application Security Testing (DAST) within the CI/CD pipeline, ensuring vulnerabilities are caught and resolved before deployment. It supports a shift-left approach, enabling early risk detection and proactive remediation without slowing delivery.

    Our AI-driven accelerators, such as Tx-SmarTest and Tx-HyperAutomate, enhance DevSecOps automation by optimizing test coverage, identifying anomalies, and adapting test strategies. These agents can intelligently monitor pipeline behavior, suggest security improvements, and even take preemptive action when risks are detected.

    Together, Tx’s DevSecOps and AI capabilities offer a future-ready framework that protects your software and evolves with it. By combining security, automation, and intelligent decision-making, we ensure your DevOps processes remain agile, compliant, and resilient in the face of modern threats.

    Summary

    Agentic AI enhances DevSecOps by enabling autonomous security testing, real-time threat detection, and intelligent pipeline management. It helps integrate security early in the CI/CD process, automates risk assessment, and supports incident response. Tx applies this approach through tools like Tx-DevSecOps, Tx-SmarTest, and Tx-HyperAutomate to streamline development and ensure secure deployments. By combining automation with adaptive learning, we support faster releases, improved code quality, and stronger security across both new and legacy systems. To learn how we can assist you, contact our experts now.

    The post DevSecOps with Agentic AI: Autonomous Security Testing in CI/CD Pipelines first appeared on TestingXperts.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Articlencgopher is a gopher, gemini and finger client
    Next Article NVIDIA AI Introduces Fast-dLLM: A Training-Free Framework That Brings KV Caching and Parallel Decoding to Diffusion LLMs

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-51672 – PHPGurukul Dairy Farm Shop Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws

    Security

    Your Wemo smart devices are about to get dumb as Belkin pulls the plug

    News & Updates

    CVE-2025-21085 – PingFederate PostgreSQL OAuth2 Memory Exhaustion

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2024-12718 – Python Tarfile Filter File Metadata and Permission Modification Vulnerability

    June 3, 2025

    CVE ID : CVE-2024-12718

    Published : June 3, 2025, 1:15 p.m. | 2 hours, 14 minutes ago

    Description : Allows modifying some file metadata (e.g. last modified) with filter=”data” or file permissions (chmod) with filter=”tar” of files outside the extraction directory.
    You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of “data” or “tar”. See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don’t include the extraction filter feature.

    Note that for Python 3.14 or later the default value of filter= changed from “no filtering” to `”data”, so if you are relying on this new default behavior then your usage is also affected.

    Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it’s important to avoid installing source distributions with suspicious links.

    Severity: 5.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2022-46739 – Apache Struts Remote Command Execution Vulnerability

    May 28, 2025

    How to Use AI to Enhance Your WordPress Blog

    May 8, 2025

    v02enc – symmetric encryption for multiple recipients

    July 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.