Endor Labs releases report on state of open source security
Endor Labs, the start-up dedicated to securing open source software reuse in application development, has released The State Of Dependency Management, which offers a view into the rampant but often unmonitored use of existing open source software in application development, and the dangers arising from this common practice.
As one example, the research reveals that 95% of all vulnerabilities are found in transitive dependencies open source code packages that are not selected by developers, but indirectly pulled into projects.
This is the first report from Station 9, a research capability developed by Endor Labs that brings together researchers, academics and thought leaders from around the world.
Dedicated to identifying vulnerabilities in the software supply chain and identifying potential solutions, Station 9 includes Georgios Gousios, who oversees software analysis, and Henrik Plate, who leads security research.
Varun Badhwar, Co-founder and CEO of Endor Labs, says, "In this environment, open source software is the backbone of our critical infrastructure but even veteran developers and executives are often surprised to learn 80% of the code in modern applications comes from existing OSS.
"This is a huge arena, yet it's been largely overlooked. This first report from Station 9 makes clear the depth of the problems in this area, and the need for substantive solutions. If the reuse of open source code is to live up to its potential, then security needs to move to the top of the priority list."
The new report from Station 9 offers a comprehensive analysis of the complexities underlying the reliance on open source software, and reveals how traditional methods of vulnerability remediation require far greater examination.
The problem isn't necessarily the widespread use of existing open source code in new applications; it is that only a small sampling of these software dependencies are actually selected by the developers involved. The rest are transitive or indirect dependencies automatically pulled into the codebase. This sets the stage for significant vulnerabilities, potential and identifiable, affecting both the worlds of security and development in equal measure.
Among other findings, the report reveals:
The vast majority of all vulnerabilities, 95%, are indeed found in transitive dependencies, making it very difficult for developers to assess the true impact of these issues, or whether they're even reachable.
A comparison between the two most popular community initiatives to identify critical projectsCensus II and OpenSSF Criticality Scores Reveals that determining criticality is far from simple. In fact, 75% of the packages in Census II have a Criticality Score of less than 0.64; organisations have to decide for themselves which open source projects are critical.
Dependency confusion has been a major benefit to the bad guys in recent supply chain attacks, while the risk indicators covered in widely used initiatives typically can't flag these attacks.
Trouble ahead 50% of the most used Census II packages didn't have a release in 2022, and 30% had their latest release before 2018 - these can cause serious security and operational issues in the future.
New does not mean secure. When upgrading to the latest version of a package, there's still a 32% chance it will have known vulnerabilities.
Reachability is the most important criteria when prioritising; doing it on the basis of security metrics alone (such as CVSS scores) or ignoring vulnerabilities in test dependencies only reduces the likelihood of a vulnerability by 20%.
The name Station 9 comes from the research facility on Endor in the Star Wars universe has been created to explore the complexities of supply chain security and the use of open source software at the enterprise, and provide guidelines and best practices on selecting, securing, and maintaining OSS. The team will continue to release more research in the near future, through reports, trade show presentations and more.