{"id":21929,"date":"2022-05-17T14:45:03","date_gmt":"2022-05-17T14:45:03","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21929"},"modified":"2022-05-17T15:30:31","modified_gmt":"2022-05-17T15:30:31","slug":"software-supply-chain-a-risky-time-for-dependencies","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/","title":{"rendered":"Software Supply Chain: A Risky Time for Dependencies"},"content":{"rendered":"\r\n<p>The <a href=\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\">software supply chain<\/a> is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surface and sometimes allow hackers to bypass robust security layers you&#8217;ve added to your infrastructure.<\/p>\r\n\r\n\r\n\r\n<p>Indeed, only one flaw in the code base can be enough to compromise the entire supply chain. The problem is modern projects have tons of dependencies. This situation is known as &#8220;dependency hell,&#8221; as your dependencies have their own dependencies, and so on. Trying to trace all those dependencies could drive you crazy.<\/p>\r\n\r\n\r\n\r\n<p>In addition, software development heavily relies on open-source platforms and third-party vendors simply because it speeds up the process and gives developers standard libraries. A wide range of people or organizations maintain the code, so it\u2019s pretty hard to prevent security flaws.<\/p>\r\n\r\n\r\n\r\n<p>Perhaps nowhere is this more evident than in package managers. Recently the RubyGems package repository patched a critical <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability<\/a> recently recorded as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2022-29176\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2022-29176<\/a>. RubyGems.org is THE Ruby community\u2019s gem hosting service, just like NPM is the official registry for the JavaScript world.<\/p>\r\n\r\n\r\n\r\n<p>These giant platforms host hundreds of thousands of packages, with millions of downloads, and are constantly under attack. Hackers try hijacking, dependency confusion or typosquatting attacks regularly, and there\u2019s even <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-sabotage-incident-hits-software-supply-chain\/\">a risk of self-sabotage<\/a> now.<\/p>\r\n\r\n\r\n\r\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-hackers-compromise-the-software-supply-chain\/\">How Hackers Compromise the Software Supply Chain<\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>A Closer Look at the RubyGems Vulnerability<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>The CVE-2022-29176 flaw was found on RubyGems.org, the package registry for the entire Ruby programming language community, and allowed &#8220;any user to remove and replace certain gems even if that user was not authorized to do so.&#8221;<\/p>\r\n\r\n\r\n\r\n<p>There were other conditions, though, as the gem, a.k.a. the Ruby package, &#8220;needed one or more dashes in its name creation within 30 days OR no updates for over 100 days.&#8221; However, it could match lots of gems on the platform.<\/p>\r\n\r\n\r\n\r\n<p>A threat actor could replace the content of a legitimate gem with a script to steal credentials or a crypto miner, a critical vulnerability.<\/p>\r\n\r\n\r\n\r\n<p>RubyGems.org did not receive complaints from gem owners, so there&#8217;s a good chance the critical vulnerability has not yet been exploited. In any case, Bundler, the package manager for Ruby, recommends using &#8220;Bundler in <code>--frozen or --deployment<\/code> in CI and during deployment.&#8221;<\/p>\r\n\r\n\r\n\r\n<p>This best practice prevents your Ruby app from switching to a hijacked version silently, which is precisely what hackers want to achieve with such an exploit.<\/p>\r\n\r\n\r\n\r\n<p>Users who need to audit their app for any past exploits can inspect the Gemfile.lock file and look for unwanted platform changes that occurred in gems while the version number did not change.<\/p>\r\n\r\n\r\n\r\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\">SBOMs: Securing the Software Supply Chain<\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Platforms Are Prone to Attacks<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Whether it\u2019s RubyGem or NPM, or even pip for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/supply-chain-flaws-found-in-python-package-repository\/\">Python packages<\/a>, such big platforms are critical parts of the software supply chain. NPM is regularly in the headlines for various campaigns that affect millions of projects and users.<\/p>\r\n\r\n\r\n\r\n<p>The JFrog Security Research team recently <a href=\"https:\/\/jfrog.com\/blog\/npm-supply-chain-attack-targets-german-based-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">detected<\/a> a new NPM supply chain attack, similar to one <a href=\"https:\/\/jfrog.com\/blog\/large-scale-npm-attack-targets-azure-developers-with-malicious-packages\/\" target=\"_blank\" rel=\"noreferrer noopener\">previously reported on Azure<\/a>. The hackers have used a dependency confusion attack with German industrial companies as targets: Bertelsmann, Bosch, Stihl and DB Schenker.<\/p>\r\n\r\n\r\n\r\n<p>The researchers said this was a &#8220;very targeted&#8221; attack. Jfrog updated the post to say they could not determine (at the time of writing) whether it\u2019s an actual threat actor or a &#8220;very aggressive&#8221; <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">pentester<\/a> behind the attack.<\/p>\r\n\r\n\r\n\r\n<p>There were various IoCs (indicators of compromise), but the hackers did not take the time to hide the name of their target on NPM and they used a public obfuscator that can be easily detected and reversed, which looks pretty unusual for cybercriminals.<br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/ZUZLEOQz3ejZK4btXMoQqnXqlWqk11_3CsX9Dpygwmr8s-q96eoYqJ7G1jeIdRUWkmdViMQiEKzLmU2Pyt_GZHDPfdEZbEq-jTX-x6uiuv-tOpk2rSBSMnsUFJFNaRRQV5q524sqxChaQeBMIg\" width=\"643\" height=\"542\" \/><\/p>\r\n\r\n\r\n\r\n<p>The dependency confusion consists of using the names of private packages to create public packages with a higher version number. When the users run an install or an update, the package manager gets confused and grabs what appears to be the most recent one.<\/p>\r\n\r\n\r\n\r\n<p>There are plenty of opportunities for hackers who want to attack the supply chain. Dependency confusion or typosquatting are clever techniques, but not necessarily the easiest to achieve.<\/p>\r\n\r\n\r\n\r\n<p>Stealing owners or maintainers&#8217; credentials can be a more practical approach, as attackers can impersonate legitimate users to perform all kinds of abuses, including distributing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> or backdoors to millions of installations.<\/p>\r\n\r\n\r\n\r\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\">Top Code Debugging and Code Security Tools<\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>How to Protect Against Supply Chain Attacks<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Most of the time, the best you can do is mitigate a supply chain threat, but there are simple actions you can take to reduce your risks:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>follow best practices for deployment and CI (e.g., recommendations of Bundler)<\/li>\r\n<li>run regular security checks and audits and never deploy something untested on live production<\/li>\r\n<li>register a public registry with the name of your private registry to prevent any typosquatting attacks<\/li>\r\n<li>use a stricter vendor policy (e.g., use the exact version number and not \u201c*\u201d or \u201c^\u201d to prevent any silent update during installations)<\/li>\r\n<li>if you are the owner or the maintainer of a package, enable multi-factor authentication<\/li>\r\n<li>never deploy configuration files or sourcemaps in production<\/li>\r\n<li>keep <strong>all<\/strong> dependencies updated<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>The last point seems a bit paradoxical, as hackers are trying to compromise update mechanisms to trick their victim into deploying malware. However, the threat landscape is growing too fast to neglect <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">security patches<\/a>. Outdated components are one of the very first elements hackers will check to see if they can exploit a known vulnerability.<\/p>\r\n\r\n\r\n\r\n<p>The software supply chain is full of peril, and yet those external resources are important for speeding up development and standardizing practices. As a developer, you cannot control the code you don\u2019t maintain &#8211; and most code in your project is not your code these days. The best answer is to be on top of your security practices.<\/p>\r\n\r\n\r\n\r\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">Best Third-Party Risk Management (TPRM) Tools<\/a><\/p>\r\n\n\n<div id=\"ta-campaign-widget-66d6fa0964a45-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fa0964a45\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fa0964a45\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fa0964a45\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fa0964a45\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fa0964a45\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fa0964a45\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surface and sometimes allow hackers to bypass robust security layers you&#8217;ve added to your infrastructure. Indeed, only one flaw in the code base can be enough to [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,15,16],"tags":[23281],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,82,379],"class_list":["post-21929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-threats","category-trends","tag-open-source-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-security-development","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software Supply Chain: A Risky Time for Dependencies | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Package managers are becoming a big source of vulnerabilities, highlighting flaws in the software supply chain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software Supply Chain: A Risky Time for Dependencies | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Package managers are becoming a big source of vulnerabilities, highlighting flaws in the software supply chain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-17T14:45:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-17T15:30:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Software Supply Chain: A Risky Time for Dependencies\",\"datePublished\":\"2022-05-17T14:45:03+00:00\",\"dateModified\":\"2022-05-17T15:30:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\"},\"wordCount\":983,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"keywords\":[\"open source security\"],\"articleSection\":[\"Applications\",\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\",\"name\":\"Software Supply Chain: A Risky Time for Dependencies | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"datePublished\":\"2022-05-17T14:45:03+00:00\",\"dateModified\":\"2022-05-17T15:30:31+00:00\",\"description\":\"Package managers are becoming a big source of vulnerabilities, highlighting flaws in the software supply chain.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"hacking techniques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software Supply Chain: A Risky Time for Dependencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software Supply Chain: A Risky Time for Dependencies | eSecurity Planet","description":"Package managers are becoming a big source of vulnerabilities, highlighting flaws in the software supply chain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/","og_locale":"en_US","og_type":"article","og_title":"Software Supply Chain: A Risky Time for Dependencies | eSecurity Planet","og_description":"Package managers are becoming a big source of vulnerabilities, highlighting flaws in the software supply chain.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/","og_site_name":"eSecurity Planet","article_published_time":"2022-05-17T14:45:03+00:00","article_modified_time":"2022-05-17T15:30:31+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Software Supply Chain: A Risky Time for Dependencies","datePublished":"2022-05-17T14:45:03+00:00","dateModified":"2022-05-17T15:30:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/"},"wordCount":983,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","keywords":["open source security"],"articleSection":["Applications","Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/","url":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/","name":"Software Supply Chain: A Risky Time for Dependencies | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","datePublished":"2022-05-17T14:45:03+00:00","dateModified":"2022-05-17T15:30:31+00:00","description":"Package managers are becoming a big source of vulnerabilities, highlighting flaws in the software supply chain.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","width":2560,"height":1707,"caption":"hacking techniques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Software Supply Chain: A Risky Time for Dependencies"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21929"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21929"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21929\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21683"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21929"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21929"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21929"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}