Niels Tanis

Reviewing 3rd party library security easily using OpenSSF Scorecard

Are your dependencies a security risk? Get an instant security score for any open-source library using OpenSSF Scorecard.

Reviewing 3rd party library security easily using OpenSSF Scorecard
#1about 4 minutes

Understanding the inherent risks of third-party dependencies

The vast majority of an application's code comes from third-party libraries, creating significant risk as shown by the Log4j vulnerability.

#2about 2 minutes

How malicious actors infiltrate open source projects

Malicious actors can introduce backdoors into trusted projects over long periods, as demonstrated by the XZ Utils supply chain attack.

#3about 2 minutes

Detecting known vulnerabilities and hidden package dependencies

Tooling can help identify publicly disclosed vulnerabilities, but risks remain from unmanaged or hidden dependencies bundled within packages.

#4about 2 minutes

Introducing OpenSSF Scorecard as a software nutrition label

OpenSSF Scorecard provides a "nutrition label" for open source projects by running automated checks to assess their security posture.

#5about 3 minutes

Breaking down key security checks in Scorecard

Scorecard evaluates projects based on the presence of known vulnerabilities, automated dependency updates, security policies, and the use of testing like fuzzing and SAST.

#6about 3 minutes

Evaluating project health and build process integrity

Scorecard assesses repository health through checks for branch protection, code reviews, contributor diversity, pinned dependencies, and signed releases.

#7about 2 minutes

Applying Scorecard to analyze a real-world package

A practical demonstration shows how to run Scorecard against a popular library like Newtonsoft.Json and use its API to analyze transitive dependencies.

#8about 3 minutes

Correlating Scorecard results with real-world security data

Research shows a strong correlation between higher OpenSSF Scorecard scores and better security outcomes, such as fewer vulnerabilities and more active maintenance.

#9about 3 minutes

Exploring the future of automated security analysis

Future improvements in security tooling should focus on deeper analysis like coverage-based fuzzing, data-flow SAST, build reproducibility, and community-based auditing.

#10about 1 minute

Final takeaways on integrating Scorecard into your workflow

Scorecard is a valuable tool for assessing project health but should be used as part of a broader security strategy, not as an end goal.

Related jobs
Jobs that call for the skills explored in this talk.

job ad

Saby Company
Delebio, Italy

Intermediate

d

Saby Company
Delebio, Italy

Junior

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 110 - XY marks the spotty security
This time we give you a collection of links about the XZ backdoor, solve the last CODE100 puzzle, announce the next round of it, let you play with colours and explain why Lava lamps are great to keep the web secure.News and ArticlesThe big piece of n...
Dev Digest 110 - XY marks the spotty security
CH
Chris Heilmann
Dev Digest 131 - AI'm not sure about OSS
News and ArticlesRust and Typescript are rising stars in programming languages 2024 survey, the State of CSS 2024 survey is open and here is what's new in ECMAScript.In security news, a Microsoft update bricks Linux dual-boot systems, they patched a ...
Dev Digest 131 - AI'm not sure about OSS
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?

From learning to earning

Jobs that call for the skills explored in this talk.