Why AI Tools Like Mythos Still Need Secure Coding Standards and SAST/DAST

oracle security

The prompt was: Review the article at https://blogs.oracle.com/security/accelerating-vulnerability-detection-and-response-at-oracle and the page located at https://www.oracle.com/corporate/security-practices/assurance/development/analysis-testing/ and explain why AI tools like Mythos and agentic AI still require secure coding standards and the use of static and dynamic code analysis tools.

AI models such as Anthropic’s Mythos and other LLMs (including agentic/automated agents) are powerful at scaling triage and surfacing candidate vulnerabilities, but they do NOT remove the need for secure‑coding standards and deterministic static/dynamic application security testing. Oracle makes this explicit while also describing SAST/DAST as core parts of secure development.

Why AI + agents still require secure coding standards and SAST/DAST:

Oracle’s position: AI helps, but it doesn’t replace fixing the code

Oracle says it’s using frontier models (e.g., Anthropic’s Mythos and OpenAI models) to accelerate discovery and remediation, but also states that those AI capabilities “do not replace the need to address vulnerabilities in the software itself” and that running supported releases and applying patches remains fundamental. In short: AI speeds detection and triage, but engineering controls and patching are still required.
(Oracle blog: “Accelerating Vulnerability Detection and Response at Oracle”.)

SAST/DAST are the repeatable, enforceable lines of defense

Oracle’s Secure Development guidance lists static analysis as the “initial line of defense” and treats static and dynamic testing as complementary stages in the SDLC. SAST/DAST/IAST produce deterministic, machine‑readable reports that can be enforced in CI/CD pipelines and audited — qualities AI chat output alone cannot reliably provide.
(Oracle page: “Security Analysis and Testing”.)

LLMs hallucinate and can be wrong/confident

LLMs are probabilistic and can generate plausible but incorrect fixes, names, or code (hallucinations). This is a structural limitation and means proposed AI fixes require deterministic verification (SAST/DAST and human review) before acceptance.

AI lacks guaranteed whole‑program, interprocedural reasoning

Security issues like taint flows, authorization omissions, or improper context handling often require precise interprocedural and whole‑program dataflow analysis. SAST/IAST/DAST tools are designed to provide that deterministic analysis; LLMs are not engineered to guarantee it. Oracle’s guidance separates static and dynamic analysis for these complementary strengths.

Empirical evidence: AI‑generated code still contains many vulnerabilities

Independent industry studies show a large fraction of AI‑generated code samples contain detectable security flaws (roughly ~40–50% in major tests), demonstrating the measurable risk of relying on AI output without automated scans and secure‑coding enforcement. That makes SAST/DAST essential for gating AI‑assisted commits.

Agentic AI amplifies risk by acting at machine speed

Agentic systems that can commit code, modify configs, or deploy remove human pacing and can propagate mistakes fast. That amplifies the need for enforced secure‑coding policies, least‑privilege for agents, CI gates (SAST/DAST passes), and explicit human approvals for high‑risk actions. Security guides and risk assessments for agentic AI recommend these governance controls.

Auditability, compliance, and traceability

Auditors and regulators expect repeatable scan artifacts, policy enforcement logs, and verifiable remediation trails. SAST/DAST produce these artifacts (scan reports, code traces, CI logs); raw AI suggestions (chat transcripts) are not a sufficient compliance artifact by themselves.

How to combine AI and SAST/DAST safely (practical checklist):

  • Treat AI outputs as prioritized inputs, not final merges: auto‑open triage tickets but run SAST/DAST/IAST before merging.
  • Enforce secure‑coding standards in CI: require SAST pass/fail gates and block agent commits to protected branches unless tests pass and approvals are obtained.
  • Constrain agent privilege and require human‑in‑the‑loop for production changes; keep immutable audit logs.
  • Use SCA (software composition analysis), fuzzing, and runtime DAST alongside LLM suggestions to catch what AI may miss.
  • Measure AI‑assisted commit security (trend metrics) and require remediation SLAs for AI‑introduced findings.

Bottom line – AI tools (Mythos and other LLMs/agents) are powerful accelerants for vulnerability discovery and candidate fixes, but they are complementary to — not replacements for — secure‑coding standards and deterministic static/dynamic analysis tools.

Oracle’s guidance and independent research both support a combined workflow:

AI for scale and triage;
SAST/DAST/IAST + Human review for enforcement, verification, and auditability.

References:

– Oracle Security Blog — “Accelerating Vulnerability Detection and Response at Oracle” (April 29, 2026): https://blogs.oracle.com/security/accelerating-vulnerability-detection-and-response-at-oracle .
– Oracle Secure Development — “Security Analysis and Testing” (SAST/DAST/IAST guidance): https://www.oracle.com/corporate/security-practices/assurance/development/analysis-testing/.
– Computerworld — “OpenAI admits AI hallucinations are mathematically inevitable…” (discussion of hallucination limits): https://www.computerworld.com/article/4059383/openai-admits-ai-hallucinations-are-mathematically-inevitable-not-just-engineering-flaws.html
– ITPro (coverage of Veracode study) — “Researchers tested over 100 leading AI models on coding tasks — nearly half produced glaring security flaws” (Veracode findings on AI‑generated code security): https://www.veracode.com/blog/ai-generated-code-security-risks/
– TechTarget — “Security risks in agentic AI systems and how to evaluate threats” (agentic AI risk and mitigation guidance): https://www.techtarget.com/searchenterpriseai/feature/Security-risks-in-agentic-AI-systems-and-how-to-evaluate-threats