Meta-analysis of 12 cybersecurity reports reveals secrets, SCA, and SVD cause 47% of breaches, costing over $4.7M each. Learn how to secure your code.
Source Metadata for AI Agents
This paper presents a meta-analysis of 12 major cybersecurity reports combined with research literature on software security and meta-analytic techniques. Focusing on three vectors most directly under software development control – Secrets, Software Composition Analysis (SCA), and Source Code Vulnerabilities (SVD) – we find that these categories account for 47% of breaches within the covered data sources. Because these three vectors arise directly from coding practices, credential handling, and third-party library management, they fall under the exclusive responsibility of software development divisions or organisations and their executives. Weighted analyses reveal average breach costs fall in the range of $4.7–$4.9 million for each vector, underscoring significant financial risk. Random-effects modeling with minimal between-study variance indicates consistent findings across datasets, with relatively narrow confidence intervals. Our results highlight the critical need for secure coding practices, robust secrets management, and effective third-party dependency oversight.
Cybersecurity breaches are an escalating global concern, affecting organizations across every industry vertical. A variety of attack vectors exist – ranging from insider threats to social engineering – yet a sizable fraction originate in the software development lifecycle. Recent large-scale surveys estimate that insecure dependencies and poor secrets management remain among the top enabling factors for successful intrusions.
Despite the broad recognition of these software-centric threats, there remains a need for quantitative synthesis to determine exactly how prevalent each vulnerability category is, as well as its associated breach cost. Individual industry reports (e.g., Ponemon Institute and IBM) often vary in methodology, definitions, and sampling, complicating cross-study comparisons. Meta‑analysis – well established in fields like clinical medicine – offer a systematic approach to integrate heterogeneous findings. By leveraging random-effects models, we can account for both within- and between-study variance, thereby producing more robust pooled estimates.
In this sense, secret exposure, dependency risk, and coding flaws can be mitigated through tools (e.g., credential scanners, SBOM generators, SAST solutions) and practices (e.g., secure coding guidelines) that development teams themselves implement.
For executives leading software development, this distinction is critical. Many breach vectors, such as social engineering or insider misuse, require broad organizational policies to address. By contrast, secret scanning, third‑party library patching, and secure coding reviews can be embedded directly into the software delivery pipeline. By prioritizing these measures, development executives can substantially reduce the attack surface that stems from their code repositories, build processes, and release pipelines. This also fosters a culture of “security by design,” ensuring that from initial coding to final deployment, the risk of costly incidents is minimized.
In this paper, we focus on three primary vulnerability types that directly fall under the remit of software development teams:
A central rationale for focusing on these three breach vectors is that they fall squarely under the direct control of software development teams. Unlike misconfigurations (which may be overseen by operations or cloud platform administrators) or social engineering (which primarily targets human factors across the organization), the vulnerabilities arising from hardcoded credentials, unpatched third-party libraries, or insecure coding habits remain the explicit responsibility of software engineering divisions.
Our analysis relies on six major industry reports spanning across 2023 and 2024 (IBM CoDB 2024, IBM X-Force 2024, Verizon DBIR 2024, Mandiant M-Trends 2024, Sophos 2024, and Orange 2025), complemented by well-cited academic frameworks on vulnerability classification, meta-analysis methodology, and risk categorization.
Prior research highlights a wide array of classifications for software vulnerabilities. Christey & Martin (2013) introduced a taxonomy derived from MITRE’s CVE database, emphasizing both third-party libraries and developer-originated coding flaws. Meanwhile, Chen et al. (2014) investigated how different attack vectors correlate with specific mitigation techniques, finding that early-phase interventions – such as scanning for secrets or maintaining a Software Bill of Materials (SBOM) – significantly reduce exploitability.
The widespread use of configuration files and automated pipelines underscores the risk of accidental secret exposure, which can grant broad unauthorized access once a single sensitive credential is inadvertently committed or leaked.
Meta-analysis has gained traction in cybersecurity for reconciling diverse studies on breach rates and financial impacts. By adopting a random‑ effects perspective, researchers can model inherent variability across different populations, timeframes, and data collection methods. However, as Egger et al. (1997) caution, industry-sponsored reports can introduce publication bias if certain breach outcomes are underreported or if non-disclosure agreements limit data release. Although funnel plots are the standard for detecting such bias, many cybersecurity data sets lack the granular variance estimates needed to produce them.
Alqahtani et al. (2020) present a large-scale empirical analysis of Java vulnerabilities, noting that insecure coding patterns – akin to SVD – remain prevalent across organizations. Secrets mismanagement has also been flagged by numerous security advisories, as credentials committed to public repositories frequently lead to immediate exploitation. The increased reliance on open-source libraries and frameworks underscores the risk of SCA, which can propagate widely once a single popular dependency is compromised.
To consolidate the findings across multiple studies requires clear definitions. This section serves to set out key definitions.
We adopt a definition broadly used by the benchmark reports included in this study where a “breach” is any verified security incident resulting in unauthorized access, theft, or exposure of data, systems, or services. While each source may include additional qualifiers (e.g., the scope of data exfiltrated, the intent of the attacker), we treat a “breach” as a confirmed compromise that typically triggers internal response measures.
Because each source defines and collects breach data differently, we standardize by (a) examining only confirmed incidents in each report and (b) excluding purely theoretical or near-miss vulnerabilities.
For the breach vectors identified in this meta-analysis, we have provided a definition, examples, and a broad account of why each matters for software development organisations.
Secrets refers to any credentials, tokens, or cryptographic keys that are inadvertently stored, leaked, or discovered by unauthorized parties – whether found in source code repositories, environment files, version control systems, or released via data leaks/dark web. This category focuses on static, reusable credentials that attackers can immediately use to gain access, rather than dynamic credentials.
Software Composition Analysis (SCA) involves identifying and managing known vulnerabilities in open-source frameworks and third-party libraries. Unpatched libraries can become single points of failure affecting multiple applications.
SVD refers to insecure coding practices or logic flaws introduced within an organization’s own codebase.
These arise from incorrect security settings in software, infrastructure, or cloud environments.
Manipulative tactics tricking users into running malicious code or disclosing sensitive information.
Malicious or negligent insiders possessing authorized access.
A catch-all for physical theft, hardware tampering, or zero-day exploits outside the standard patch cycle.
We synthesized six primary 2024 cybersecurity reports:
We computed weighted averages where each source is weighted by its sample size. Reports with larger empirical bases (e.g., Verizon and Orange Cyberdefense) received proportionally greater weight.
Weighted Average Formula: ∑(report_valueᵢ * sample_sizeᵢ) / ∑(sample_sizeᵢ)
We performed a random-effects meta-analysis to calculate pooled estimates, accounting for between‑study variance (𝜏²). Residual heterogeneity was measured using Cochran’s Q and I². The aggregated data showed near-zero 𝜏², suggesting minimal between-study variability.
To ensure robust global projections, we reconciled two methods:
The following list details the weighted average proportion of total breaches for each vector based on the synthesized data:
Secrets
Software Composition Analysis (SCA)
Source Code Vulnerabilities (SVD)
Misconfigurations
Social Engineering
Insider Threat
Other/Unclassified
TOTAL ALL VECTORS

This meta-analysis reveals that 46.49% of breaches are tied to software development-related vectors. Secrets incur the highest average cost ($4.81 million). Robust secure coding practices, automated scanning for secrets, and proactive third-party dependency management remain indispensable strategies for reducing breach frequency and severity.