
Research
Security News
The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
Sarah Gooding
May 1, 2024
In this episode of the Risky Business podcast, host Tom Uren chats with Socket founder and CEO Feross Aboukhadijeh. They delve into the vulnerabilities of open source software through the lens of notorious supply chain attacks like XZ-utils and Event-Stream. Feross shares how previous incidents inspired the creation of Socket, which detects and prevents such attacks by closely monitoring changes in software packages.
Ideally, developers should scrutinize every line of code they use, but that's simply not realistic. Threat actors are counting on this and some put in more effort to launch sophisticated attacks that get past static analysis. This is why Socket leverages LLMs for further analysis, to pick up on signals that are more difficult for humans to catch at scale.
With 90% of the code in most apps being open source, the volume of code that isn’t reviewed has significantly increased the risk for supply chain attacks. The episode explores how the rise of small, hyper-specific open source packages and a shift towards individual maintainers have created a wider attack surface.
The discussion touches on how open source development practices have contributed to these vulnerabilities in the ecosystem:
Check out the episode below:
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Research
Security News
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
ESLint now supports HTML linting with 48 new rules, expanding its language plugin system to cover more of the modern web development stack.
Security News
CISA is discontinuing official RSS support for KEV and cybersecurity alerts, shifting updates to email and social media, disrupting automation workflows.