Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Better Manage Open-Source Dependencies and Lessen Vulnerabilities
Cybersecurity

How to Better Manage Open-Source Dependencies and Lessen Vulnerabilities

Bill DoerrfeldBy Bill DoerrfeldDecember 8, 2022Updated:January 27, 20236 Mins Read
Facebook Twitter LinkedIn Email
vulnerabilities transitive dependencies
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In life, as in business, it’s not just about who you depend on that matters — it’s who they depend on as well. And just as in human relationships, software ecosystems comprise a vast network of relationships. Some of these ties go very deep, while others are more surface-level. But the fact remains: Modern open-source-based software (OSS) development involves a vast dependency tree with long roots that touch known and unknown risks.

A recent Endor Labs report found that 95% of vulnerable dependencies are transitive ones. These transitive dependencies are components tucked deep into the software chain, making them more challenging to assess and reach. And it’s not necessarily that these vulnerable packages are far outdated — 25% of packages released in 2022 still have between one and 18 known vulnerabilities.

New vulnerabilities around open-source dependencies continue to present themselves on a daily basis. Recent software supply chain chaos adds another layer to the maintenance burdens of “dependency hell.” And although non-profit organizations and government bodies have sought to improve open-source security and introduce regulations around securing third-party software, the industry is still a long way off from having the standards and techniques necessary to stem the tide.

Endor’s 2022 State of Dependency Management study looks at the intricacies of modern open-source-based development and offers guidance. Below, I’ll summarize the study’s main points to better understand the state of dependency management and how cybersecurity professionals should respond.

Understanding Transitive Dependencies

A direct dependency is when an app directly relies on a certain library or package to function. A transitive dependency, on the other hand, is a dependency embedded within a package. As one can imagine, there could be multiple levels of transitive dependencies that app developers unknowingly insert into their applications by including other dependencies. Chart 8 from the report visually depicts how transitive dependencies come to live within downstream applications:

transitive dependencies

The report found that the average depth is two steps away, but it could get as far as seven in some cases. 

For this study, Endor Labs took a data set from the Census II report, which provided a list of the most popular free open-source software (FOSS), and enriched it with other sources. The data, open-sourced on GitHub, represents a scan of production applications covering popular distributions such as npm, maven, nugget, pipit, and ruby gems.

Out of the 254 distinct Maven packages mentioned in the Census II dataset, most have an average of 14 dependencies. This might not seem very high, but given that most applications have dozens, if not hundreds, of dependencies, the likelihood of an application possessing affected transitive dependencies rises exponentially.

As such, there’s a 32% chance a random Maven package will have one or more known vulnerabilities hidden in its dependency tree. Some outliers have far more dependencies, increasing the chances of potential vulnerabilities. For example, log4j-core v2.19.0 had 141 dependencies, and aws-java-sdk v1.12.316 was found to have a staggering 331 dependencies. 

Solutions and Tips to Manage Dependencies

In a cloud service provider (CSP) world, security responsibility is shared. The CSP secures the infrastructure, and the consumer secures the apps and media built on top of it. However, in the open-source world, the security burden largely falls into the hands of the software consumer.

“OSS consumers keep overall responsibility and need to address security risks according to their specific circumstances.”

That being said, we have seen substantial movement from regulatory bodies to establish more standards concerning third-party dependencies. These include the Candidate EU Cybersecurity Certification Scheme for Cloud Services, White House Executive Order 14028, and guidelines from NIST, NITIA, and ENISA. 

Furthermore, non-profit groups like OpenSSF, CNCF, and OWASP continue to disseminate best practices and develop relevant security tooling. Yet, software providers must still take it upon themselves to ensure that their dependency trees are stable and free from major vulnerabilities.

Here are some tips, culled from the report, on how to respond:

Contribute to open-source projects. As I’ve previously covered, too many companies use open source without contributing back to the projects. Open source requires a group effort to improve, but in proportion to their high usage rates, few organizations actually support them and report security exploits.

Build a smarter culture around software acquisition and dependency management. Software providers need to dive deeper into “dependency hell” to audit their surface area and discover what they rely on. This also means updating old components in the dependency tree and being more selective during acquisition to avoid malicious packages.

Remove unused dependencies. If a program does not invoke a dependency in an upstream project, it is best to remove it. This can reduce the probability of hidden vulnerabilities and also minimize bloat. As the report says, software composition analysis (SCA) tools should prioritize analyzing dependencies that will actually show themselves in production, not ones solely used for testing purposes.

Prioritize high-risk and reachable vulnerabilities. You’ll likely want to quickly fix exploits with high CVSS scores. Yet, also consider the reachability of the vulnerability since hackers might target low-risk ones simply if they’re easier to exploit.

Time your updates right. The study found that only 9% of updates require a major version change. Yet, 20.1% of non-major releases cause breaking change! Dependency updates can take time and effort to debug, yet leaving them unaddressed can leave major exploits prone to attack. So, it’s good to set up a regular update cadence that works for your team.

Software Ages Like Milk, Not Wine

In recent years, we’ve witnessed big exploits such as SolarWinds, Log4j, and Spring4Shell, and this year the Apache Commons Text Vulnerability and protestware came into focus. Typo-squatting and dependency confusion attacks will also likely continue in the year to come, along with unforeseen attack vectors. 

And with all we know now, responding to these risks will require ongoing vigilance. Because unfortunately, if left to sit, software is quick to rot. “Software is like milk — it gets sour quick,” as one line in the report puts it. Knowing how interconnected the modern dependency tree is, it’s essential to maintain oversight of the growing number of dependencies — and their vulnerabilities — that make up modern software ecosystems.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in Endor Labs?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cloud cloud service Cybersecurity Endor-Labs Open-Source Software software supply chain vulnerability
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live

May 14, 2025

Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

May 12, 2025

Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD

May 12, 2025

IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation

May 9, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft’s Mission to Make Your Company AI First
  • Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live
  • Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration
  • Arvind Krishna’s Next IBM Miracle
  • ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.