According to a recent LinkedIn post from StackHawk, the company is closely tracking OpenAI’s March launch of Codex Security and its early private beta results. The post notes that Codex Security reportedly identified previously unknown critical vulnerabilities in projects such as GnuTLS, OpenSSH, and Chromium, while also reducing false-positive rates.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The LinkedIn commentary emphasizes what it describes as a structural limitation of Codex Security’s approach, highlighting that the system analyzes repositories and validates findings in sandboxed environments rather than sending requests to live, running applications. According to the post, this leaves gaps in detecting runtime issues such as broken object-level authorization, infrastructure misconfigurations, and business logic flaws that emerge only under real request conditions.
From an investor perspective, the post suggests StackHawk is positioning itself around the importance of runtime application security testing as a distinct and necessary complement to repository-based AI security tools. This framing may support StackHawk’s value proposition in the application security market by underscoring demand for solutions that test deployed applications, potentially differentiating its offerings from AI-first code analysis tools and reinforcing its relevance as AI-driven security products gain traction.

