{"id":6800,"date":"2020-08-26T09:00:00","date_gmt":"2020-08-26T07:00:00","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=6800"},"modified":"2022-06-09T18:04:19","modified_gmt":"2022-06-09T16:04:19","slug":"open-source-security","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/","title":{"rendered":"Does open source software have a security problem?"},"content":{"rendered":"\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-ac8289dc      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#open-sources-community-focus-may-also-be-its-downfall\" class=\"uagb-toc-link__trigger\">Open source&#039;s community focus may also be its downfall<\/a><li class=\"uagb-toc__list\"><a href=\"#common-open-source-database-security-problems\" class=\"uagb-toc-link__trigger\">Common open source database security problems\u00a0<\/a><li class=\"uagb-toc__list\"><a href=\"#dont-forget-to-secure-passwords\" class=\"uagb-toc-link__trigger\">Don&#039;t forget to secure passwords!\u00a0<\/a><li class=\"uagb-toc__list\"><a href=\"#the-importance-of-secure-by-design\" class=\"uagb-toc-link__trigger\">The importance of secure by design<\/a><li class=\"uagb-toc__list\"><a href=\"#looking-for-resources\" class=\"uagb-toc-link__trigger\">Looking for Resources?<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<p>You&#8217;d be hard-pressed to find a day where a cybersecurity incident doesn&#8217;t hit the news, whether it&#8217;s hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, damaged businesses, shut people out of critical public and health databases, and caused chaos. You might think your company is protected as you use proprietary software. But it&#8217;s not so simple. <a href=\"https:\/\/www.codemotion.com\/magazine\/articles\/news\/ibm-open-sources-edge-platform-wishes-aws-microsoft-got-on-board\/\" class=\"ek-link\">Open source<\/a> components and libraries are the foundation of literally every application in every industry, and the need to identify, track, and manage open source software security is more important than ever. Many people will remember what is arguable the worst cyberattack of 2017, upon Equifax, where hackers stole the personal information of 147.7 million Americans from its servers. Hackers used an Apache Struts vulnerability,\u00a0<a href=\"https:\/\/www.cnet.com\/news\/equifax-ceo-data-breach-heres-what-went-wrong\/\" target=\"_blank\" rel=\"noreferrer noopener\">a months-old issue that Equifax knew about but failed to fix.<\/a>\u00a0<\/p>\n\n\n\n<p>&nbsp;<a target=\"_blank\" href=\"https:\/\/www.synopsys.com\/\" rel=\"noreferrer noopener\">Synopsys&#8217;<\/a>&nbsp;recently launched their 5th Open Source Security and Risk Analysis (OSSRA) report. The CyRC teams examined anonymized audit findings from over 1,250 commercial codebases in 17 industries, including Enterprise Software\/SaaS, Energy, and Healthcare. In 9 of 17 industries, 100% of the codebases contained open source.<\/p>\n\n\n\n<p>The authors assert that &#8220;Whether you are a member of an IT, development, operations, or security team if you don&#8217;t have policies in place for identifying and patching known issues with the open source components you&#8217;re using, you&#8217;re not doing your job. The open source community usually issues small updates at a much faster pace than the average commercial software vendor. When these updates contain security updates, companies need to have a strategy to adopt them rapidly. But because open source updates need to be &#8220;pulled&#8221; by users, an alarming number of companies consuming open source components don&#8217;t apply the patches they need, opening their business to the risk of attack and applications to potential exploits.&#8221;<\/p>\n\n\n\n<p>I recently spoke with Steve Hoffman, VP of Engineering at&nbsp;<a target=\"_blank\" href=\"https:\/\/www.percona.com\/\" rel=\"noreferrer noopener\">Percona,<\/a>&nbsp;who develop open source software projects for MySQL, MariaDB, PostgreSQL, MongoDB and RocksDB users. He notes the visibility of bad decisions: &#8220;Some companies can hide behind &#8220;security through obscurity&#8221;, but open source projects can&#8217;t take that approach, so implementations have to be well thought out in advance. We design and code with security at the top of the priority list, otherwise we&#8217;ll find ourselves dropping in popularity as we climb the CVE charts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-open-source-s-community-focus-may-also-be-its-downfall\">Open source&#8217;s community focus may also be its downfall<\/h2>\n\n\n\n<p>Popular <a href=\"https:\/\/www.codemotion.com\/magazine\/video\/the-developer-advocate-role\/\">open source <\/a>projects typically are resources with healthy communities of people improving, updating, and patching vulnerability issues as they become known. However, many developers don&#8217;t bother to vet the health of a community before downloading an open source component. Even if a developer takes care to initially download components from robust open source communities, there&#8217;s no guarantee the community will remain active in maintaining that component or the specific version downloaded.&nbsp;<\/p>\n\n\n\n<p>The OSSRA report shared that Black Duck Audits conducted in 2019 found that 91% of the codebases examined contained components that were more than four years out of date or had no development activity in the last two years. Besides adding to the security risk, the danger of getting too far behind in versioning is that the simple act of updating to the latest version can introduce unwanted functional changes, such as the disappearance of key features.<\/p>\n\n\n\n<p>Engaging with the communities whose open source projects your organization relies on is one of the best ways to ensure those projects stay healthy, vital, and up to date.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-open-source-database-security-problems\">Common open source database security problems&nbsp;<\/h2>\n\n\n\n<p>Steve notes that there are some common issues around databases and security:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Missing access control &#8211; several open source databases ship as standard with no default requirement to set passwords. &#8220;In the rush to get implementations done and overcome strange error messages, this may get missed, leaving data sets available to access if you are not careful.&#8221;<\/li><li>More privilege than needed &#8211; &#8220;it&#8217;s unlikely that your application user needs &#8220;root&#8221; or &#8220;super&#8221; level access on the database but in the rush to get past errors, the instinct is to use the &#8220;big hammer&#8221; approach and grant far more power than is needed. This puts the entire database at risk if the account is compromised.&#8221;<\/li><li>No version control &#8211; updating databases to the latest version is a simple way to avoid potential security issues. However, developers may not think to track this over time or may miss older database instances over time. Tracking your instances and knowing any that need updates is therefore worthwhile.<\/li><li>Misconfiguration &#8211; even if you have access control and an up to date instance, a misconfiguration can lead to data leakage if you are not careful. This can be something as simple as forgetting to turn off an application debugger in production, which can leak highly sensitive information to the wrong people.&nbsp;&nbsp;<\/li><li>Poor security settings &#8211; with external authentication plugins there&#8217;s no reason to share accounts and many popular open source databases can control access centrally and provide a great audit log of who did what and when but that means nothing if everyone logs in and runs commands as &#8220;admin&#8221;.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-don-t-forget-to-secure-passwords\">Don&#8217;t forget to secure passwords!&nbsp;<\/h2>\n\n\n\n<p>&nbsp;According to Steve, developers need to consider things like &#8220;least privilege&#8221;, &#8220;sanitizing inputs&#8221;, &#8220;who will have host access&#8221;, &#8220;best protocols to use&#8221; and the like. &#8220;In most cases, devs tend to put the most energy into the most complex topics and inevitably leave silly things open, like leaving passwords in logs or on filesystems that are world-readable.&#8221; This was confirmed in a 2019 data breach where an ElasticSearchserver was left exposed online without a password. More recently, over five billion records were&nbsp;<a target=\"_blank\" href=\"https:\/\/cisomag.eccouncil.org\/unprotected-elasticsearch-server-leaks-5-billion-records\/\" rel=\"noreferrer noopener\">exposed<\/a>&nbsp;after a U.K.-based security firm inadvertently exposed its &#8220;Data breach Database&#8221;, which stored security incidents without password protection. In&nbsp;<a target=\"_blank\" href=\"https:\/\/cisomag.eccouncil.org\/db8151dd-an-untraceable-data-breach-22-mn-emails-compromised\/\" rel=\"noreferrer noopener\">May this year<\/a>, Security researcher Troy Hunt discovered an open Elasticsearch database containing around 22 million of email records.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-importance-of-secure-by-design\">The importance of secure by design<\/h2>\n\n\n\n<p>A strategy around &#8216;secure by design&#8217; is a must. From there, frameworks around security models can be established and sufficient documentation can be made available on how to adhere to the guidelines for anyone that wants to contribute. Steve notes that &#8220;At the end of the day though, security is made or broken at the individual level. The peer-review process will catch many things, but even with the best policies around security and development in place, it&#8217;ll only be as good as the coder that creates it and the reviewers that double-check the work. &#8220;<\/p>\n\n\n\n<p>According to Steve, the minimum best practice testing needs to include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>&nbsp;Positive and negative testing,&nbsp;<\/li><li>Privilege level testing<\/li><li>Scanning for hardcoded passwords\/keys<\/li><li>Penetration testing<\/li><li>Vulnerability scanning of the code as well as any third-party libraries used (XSS, Injection attacks, etc).&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p>Steve asserts that while exploits can be quite complex, one of the best approaches to security is simplicity:&nbsp;<\/p>\n\n\n\n<p>&#8220;The more complex the use cases, the more likely one is to miss a combination that can put an application or database at risk. Obviously, it&#8217;s not always possible as needs increase, but most organizations I know of have *someone* in a security role. However, I&#8217;ve seen so few engineers take advantage of that fantastic resource and get ideas of what to do to program defensively. This collaboration eliminates a lot of the guesswork on what to be considering when you harness that expertise.&#8221;<\/p>\n\n\n\n<p>Microsoft recently <a href=\"https:\/\/walkersands-dot-yamm-track.appspot.com\/Redirect?ukey=1K2R14kg5d_rKi28r9eedPri_TWurZajwUW47kQrLxXA-2105118705&amp;key=YAMMID-77073828&amp;link=https%3A%2F%2Fwalkersands-dot-yamm-track.appspot.com%2FRedirect%3Fukey%3D1K2R14kg5d_rKi28r9eedPri_TWurZajwUW47kQrLxXA-1168889347%26key%3DYAMMID-56948235%26link%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fsecurity%252Fblog%252F2020%252F08%252F03%252Fmicrosoft-open-source-security-foundation-founding-member-securing-open-source-software%252F\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> it will join forces with many leading industry partners to create the Open Source Security Foundation (OpenSSF). The OpenSSF brings together work from the Linux Foundation-initiated Core Infrastructure Initiative (CII), the GitHub-initiated Open Source Security Coalition (OSSC), and other open-source security efforts to improve the security of open-source software by building a broader community, targeted initiatives, and best practices. Microsoft is proud to be a founding member alongside GitHub, Google, IBM, JPMC, NCC Group, OWASP Foundation, and Red Hat.<\/p>\n\n\n\n<p>The OpenSSF notes that the open source software that ultimately reaches end-users has a chain of contributors and dependencies. It is important that those responsible for their user or organization\u2019s security are able to understand and verify the security of this dependency chain. The initial technical initiatives will focus on:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Vulnerability Disclosures<\/li><li>Security Tooling<\/li><li>Security Best Practices<\/li><li>Identifying Security Threats to Open Source Projects<\/li><li>Securing Critical Projects<\/li><li>Developer Identity Verification<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-looking-for-resources\">Looking for Resources?<\/h2>\n\n\n\n<p>The<a href=\"https:\/\/www.codemotion.com\/magazine\/video\/prevent-api-attacks\/\"> Open Web Application Security Project (OWASP)<\/a> is a nonprofit foundation that works to improve the security of software. They&#8217;ve compiled an extensive\u00a0<a href=\"https:\/\/owasp.org\/www-community\/Free_for_Open_Source_Application_Security_Tools\" target=\"_blank\" rel=\"noreferrer noopener\">list<\/a>\u00a0of automated vulnerability detection tools that are free for open source projects.<br>Also, read <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-life\/how-to-start-with-open-source-projects-and-which-to-choose\/\" target=\"_blank\" aria-label=\"this article (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">this article<\/a> to discover how to get started with Open Source!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;d be hard-pressed to find a day where a cybersecurity incident doesn&#8217;t hit the news, whether it&#8217;s hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, damaged businesses, shut people out of critical public and health databases, and caused chaos. You might think your company&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\">Read more<\/a><\/p>\n","protected":false},"author":85,"featured_media":6801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":5,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4329],"tags":[5401,38],"collections":[],"class_list":{"0":"post-6800","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"tag-open-source","9":"tag-security-manager","10":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Does open source software have a security problem? - Codemotion<\/title>\n<meta name=\"description\" content=\"Recent data breaches highlight the trend of open source security challenges. Fortunately, there&#039;s plenty you can do to mitigate such risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does open source software have a security problem?\" \/>\n<meta property=\"og:description\" content=\"Recent data breaches highlight the trend of open source security challenges. Fortunately, there&#039;s plenty you can do to mitigate such risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-26T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-09T16:04:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1012\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cate Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cate Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\"},\"author\":{\"name\":\"Cate Lawrence\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\"},\"headline\":\"Does open source software have a security problem?\",\"datePublished\":\"2020-08-26T07:00:00+00:00\",\"dateModified\":\"2022-06-09T16:04:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\"},\"wordCount\":1440,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg\",\"keywords\":[\"OpenSource\",\"Security Manager\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\",\"name\":\"Does open source software have a security problem? - Codemotion\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg\",\"datePublished\":\"2020-08-26T07:00:00+00:00\",\"dateModified\":\"2022-06-09T16:04:19+00:00\",\"description\":\"Recent data breaches highlight the trend of open source security challenges. Fortunately, there's plenty you can do to mitigate such risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg\",\"width\":1012,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Does open source software have a security problem?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\",\"name\":\"Cate Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"caption\":\"Cate Lawrence\"},\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Does open source software have a security problem? - Codemotion","description":"Recent data breaches highlight the trend of open source security challenges. Fortunately, there's plenty you can do to mitigate such risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/","og_locale":"en_US","og_type":"article","og_title":"Does open source software have a security problem?","og_description":"Recent data breaches highlight the trend of open source security challenges. Fortunately, there's plenty you can do to mitigate such risks.","og_url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2020-08-26T07:00:00+00:00","article_modified_time":"2022-06-09T16:04:19+00:00","og_image":[{"width":1012,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Cate Lawrence","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Cate Lawrence","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/"},"author":{"name":"Cate Lawrence","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1"},"headline":"Does open source software have a security problem?","datePublished":"2020-08-26T07:00:00+00:00","dateModified":"2022-06-09T16:04:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/"},"wordCount":1440,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg","keywords":["OpenSource","Security Manager"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/","url":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/","name":"Does open source software have a security problem? - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg","datePublished":"2020-08-26T07:00:00+00:00","dateModified":"2022-06-09T16:04:19+00:00","description":"Recent data breaches highlight the trend of open source security challenges. Fortunately, there's plenty you can do to mitigate such risks.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg","width":1012,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/open-source-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.codemotion.com\/magazine\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Does open source software have a security problem?"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1","name":"Cate Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","caption":"Cate Lawrence"},"url":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-600x600.jpg","author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg",1012,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-768x512.jpg",768,512,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg",1012,675,false],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg",1012,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg",1012,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled.jpg",100,67,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/07\/sebastiaan-stam-RChZT-JlI9g-unsplash-scaled-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_comment_info":0,"uagb_excerpt":"You&#8217;d be hard-pressed to find a day where a cybersecurity incident doesn&#8217;t hit the news, whether it&#8217;s hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, damaged businesses, shut people out of critical public and health databases, and caused chaos. You might think your company&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/6800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=6800"}],"version-history":[{"count":7,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/6800\/revisions"}],"predecessor-version":[{"id":17983,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/6800\/revisions\/17983"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/6801"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=6800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=6800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=6800"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=6800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}