Open Source Dependency Risk Management
Most apps today run on open source code — and 84% of those codebases carry at least one known security vulnerability.
Most apps today run on open source code — and 84% of those codebases carry at least one known security vulnerability.

Over 84% of codebases contain at least one open source vulnerability. Managing your dependencies is no longer optional — it's what separates secure software teams from breached ones. This post breaks down the risks, practical fixes, and how Secure.com's AppSec Teammate keeps your supply chain clean.
Not all open source licenses are the same. MIT and Apache licenses are permissive — GPL and AGPL are not. Using a restrictively licensed library in the wrong context can force you to open-source your proprietary code, expose you to legal claims, or trigger contract violations with enterprise customers. License compliance needs to be reviewed before a package is added, not after your product ships.
The Log4Shell vulnerability (CVE-2021-44228) in Log4j hit thousands of organizations overnight because so many products quietly depended on the same library.
This is the nature of open source risk: one flaw in a widely used package becomes everyone's problem at once. The average codebase now has 581 known open source vulnerabilities; double the count from just one year ago. Most organizations lack the tooling and processes to systematically address this growing backlog.
Malicious actors plant harmful code inside open source packages — either by publishing look-alike packages with typo names (typosquatting), injecting code into trusted packages, or compromising maintainer accounts.
The 2024 XZ Utils backdoor showed that even long-trusted contributors can be bad actors. Traditional malware scanners don't catch these attacks, which is what makes them so dangerous.
A direct dependency is the library you add to your project. A transitive dependency is the library that library depends on — and the one after that, and so on. A simple 12-package Node.js application can balloon to 345 installed packages once transitive dependencies are included. Each of those packages carries its own vulnerabilities. Most teams have no visibility into this layer at all.
When a maintainer stops updating a project, no security patches get released. Vulnerabilities discovered after that point go unfixed forever. Teams that continue using abandoned libraries are betting that no one will exploit those gaps — a bet that rarely pays off.
Managing dependency risk doesn't require overhauling your entire development process at once. The most effective approach is methodical and incremental.
Don't try to fix everything at once. Begin your SCA program with one team and one codebase. Let that team build the muscle for reviewing and remediating dependency risks before expanding to the rest of the organization. The initial scan will almost always surface a backlog larger than expected — starting small keeps that from becoming paralyzing.
License compliance doesn't have a one-size-fits-all answer. The right policy depends on what your own code's license is, where the software is deployed, and how your legal team interprets risk. Work with your legal contact to define approved and prohibited licenses for each type of application you build. Create multiple license profiles for different use cases — internal tools vs. customer-facing products and enforce those profiles through your tooling.
Start by enforcing quality gates on new code only, not your entire legacy codebase. This keeps development moving while making sure no new critical vulnerabilities get merged in. A good starting condition: block merges where any new dependency risk is rated higher than "Info." Once the team handles new issues quickly, tighten the gate to cover existing code too.
You can only improve what you measure. Track the number of open dependency risks over time, their severity distribution, and how fast your team resolves them. An SBOM (Software Bill of Materials) is the foundation of this visibility — projects using an SBOM fixed vulnerabilities 264 days faster on average than those that didn't.
Once quality gates stop new risks from entering your codebase, focus on burning down the backlog. Start with Blocker and High severity findings. Work with your development team to assess each one: Can the dependency be upgraded? Does the vulnerability actually affect your usage of the library? Structured triage turns an overwhelming list into a prioritized work plan.
Open source dependencies are not going away — they are what makes modern software development possible. But speed without visibility creates risk, and that risk is growing. The average app carries hundreds of vulnerable dependencies. Most go unpatched for over a year. Malicious packages are multiplying. Manual review doesn't scale.
The good news: this problem is solvable. A structured approach — starting small, enforcing quality gates, tracking your inventory, and using tools that automate the hard parts — turns an unmanageable backlog into a controlled, improving baseline. Secure.com's Digital Security Teammate gives teams the governance layer that turns noisy SCA alerts into prioritized, automated remediation workflows.
The question isn't whether to manage open source risk. It's whether you'll do it proactively (with the right tools and processes) or reactively after a breach forces your hand.
It's the practice of identifying, assessing, and reducing the security, legal, and operational risks that come from using third-party open source libraries in your software. This includes scanning for vulnerabilities, tracking license compliance, and making sure dependencies are actively maintained.
A direct dependency is a library your team explicitly adds to a project. A transitive dependency is a library that your direct dependency relies on — often several layers deep. Most teams only see their direct dependencies, but transitive ones carry equal risk and often make up the majority of packages in a codebase.
A Software Bill of Materials (SBOM) is a complete inventory of all open source components in your software, including versions and license information. Organizations using an SBOM resolved vulnerabilities 264 days faster on average. It's also increasingly required by regulations like the EU Cyber Resilience Act.
Start by running an SCA scan to surface your current exposure, then enforce a quality gate that blocks new high-severity vulnerabilities from being merged. These two steps alone stop the problem from growing while you work down the existing backlog.

AI handles repetitive work. Your L1 and L2 analysts handle everything else.

SOC 1, SOC 2, and SOC 3 are not levels — they're three separate audit reports that serve completely different purposes. Here's how to tell them apart.

Learn the top vulnerability remediation best practices to close security gaps faster, reduce risk, and build a stronger defense before attackers strike.