As software development evolves, so must the approach to security. Application security is essential throughout the development cycle, yet many organizations continue to rely on traditional pipelines that identify vulnerabilities, problematic dependencies, and license violations late in the process. This approach introduces delays, increases risks, and often forces developers to address security issues only after code has been pushed.
In this article, we explore how shifting security left empowers developers to catch and resolve issues early in the coding process by using tools integrated directly into their development environment.
The problem with traditional security pipelines
Traditional security pipelines usually scan code for vulnerabilities after the code has been pushed. While necessary, this presents several issues:
Shift left—bringing security closer to developers
Shift left is about moving security earlier in the software development lifecycle, empowering developers to address security concerns directly in their workflow. Rather than relying solely on downstream security checks, developers can integrate security into their environment as they write code, catching vulnerabilities, problematic dependencies, and license violations before code reaches production or even the pipeline.:
Key benefits of this approach include:
A real-world example of shift left in action
In a recent, internal SLB European hackathon, we tackled the challenge of detecting security vulnerabilities in code dependencies earlier in the development cycle. Our team created a tool that integrates directly into developers' coding environments, enabling them to identify and address security issues as they write code, without having to rely on post-development pipeline scans or external systems.:
The tool, integrated as a Visual Studio Code (VSCode) extension, enables real-time detection of vulnerabilities in dependencies. It supports multiple programming ecosystems and gives developers immediate insights into potential threats, so they can resolve issues before they escalate. This developer-first approach to security was recognized with a first-place award for its impact on improving both security and development efficiency.
We selected VSCode for its popularity, flexibility, and ease of integration. Its extension ecosystem means we can seamlessly embed security checks like static application security testing (SAST) and common vulnerabilities and exposure (CVE) scanning into the coding workflow, ensuring a smooth, efficient developer experience without compromising performance.
Beyond vulnerabilities: expanding developer security tools
The plan is to move the security checks from the existing pipelines to the code editor. This includes:
Security vulnerabilities in code (SAST)
Dependency vulnerabilities (CVE Scans)
Code quality and bug detection
License violations (open-source compliance)
Rémi Testa
Cyber-Security Engineer
Rémi is a senior cybersecurity engineer at SLB. He enjoys sharing his knowledge and passion for this field with others. Prior to his career in cybersecurity, he worked in software development for multiple companies for over 10 years.
Please contact Rémi at Linkedin
 
Mellany Abdoulwahab
Full Stack Software Engineer
Mellany is a full-stack software engineer with nine years of experience. For the last two years, she has been working at SLB, improving her skills and learning about different areas of technology. Curious and passionate, Mellany constantly seeks to expand her knowledge, and she has recently discovered a genuine interest in cybersecurity, a field she is eager to explore further.
Please contact Mellany at Linkedin