Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Open source developer tools have won: That’s a supply chain risk

By Randall Degges, - Head of Developer Relations and Community at Snyk
Two people working at laptops with documents

Image via Unsplash

March 18, 2024

It’s a done deal. In terms of market share, mindshare and innovation, open source developer tools have won the battle for the hearts and tool belts of engineers everywhere. From IDEs to build tools to package managers, open source has become the backbone of modern software development environments. 

While this is a clear triumph for open source, we must also acknowledge the elephant in the room — the potential for massive supply chain risks. Developer tools are the ultimate supply chain attack vector. Any successful attacks would be exposing not just a productivity tool that holds sensitive data, but one that is used to write and build software. This means attackers can compromise not only an organization’s technology environment, but also the code its developers write and commit. Developer tools are granted privileged status in almost every organization. 

None of this is to say that open source tools are inherently less secure than proprietary tools. On the contrary. But the likely impact of this dominant market position is a lot more malicious attention from very smart yet bad folks — including the most sophisticated advanced persistent threat groups (APTs) on the planet and hacking crews sponsored by nation-states. To deal with this reality, the maintainers of open source developer tools will need to work doubly hard to ensure that they maintain software supply security. 

The rise of open source

The evidence that open source developer tools have won is widespread. According to recent research, which surveyed over 400 application developers, security engineers and DevOps practitioners, over 60% of respondents said their organizations have a developer tool stack comprising 50% or greater open source tools. Across the broad landscape of developer tools, open source is everywhere. GitHub and GitLab, the two dominant source code repositories and version control platforms, are both built on the core Git project. VS Code, which is built on an open source core, is by far the dominant integrated development environment (IDE). 

The StackOverflow 2023 Developer Survey of over 80,000 developers found that more than 70% of developers use VS Code. Many of the other commonly used IDEs are open source. In build tools, a significant portion are open source projects. And, of course, Docker and Kubernetes, the dominant application container and the dominant container orchestration platform, respectively, are both open source.

The supply chain risk

Unfortunately, ubiquity loves unsavory company. While open source tools offer numerous benefits, including greater transparency to identify bugs and monitor code activity, they also can magnify software supply chain risks. VS Code, for example, is built on the Electron framework and Chromium browser core. It uses TypeScript, a strongly typed version of JavaScript that improves security. That said, VS Code has hundreds and hundreds of direct and transitive dependencies, which might open it up to attack. 

Other open source dev tools have different weak points. Git is written in C, a language that is notoriously challenging to secure and is most definitely not secure by default. The core group of Git maintainers are gifted engineers, including some security wizards. That said, attackers seeking to compromise Git can easily surmise potential weaknesses based on how C works. Because most popular open source developer tools are backed by significant organizations and companies, the bar for hacking them is high. But when it happens, the potential for disruption and chaos is massive. 

Mitigating the risks: Know what’s running, zero trust 

Mitigating the risks to open source tools is more about infrastructure security than code security. The first step is to know what is running inside your organization. Centralizing on a single IDE and a small set of common tools can simplify this challenge. Other approaches include using a common desktop package manager or cloud IDEs to enable DevEx teams to validate exactly what version of what tool is run by each developer and team. 

Another essential step is to make sure you are monitoring activity emanating from developer, build, and CI/CD tooling. These tend to be “softer” targets in the traditional security approach because they are so far inside the perimeter. When they are in the cloud, of course, then an organization will likely secure them more aggressively using secrets and MFA. In either case, adopting a Zero Trust posture by applying least-privilege management and continuous authorization on all developer-facing tooling can compartmentalize risk and reduce the blast radius of any incidents.  

A third pillar of risk mitigation is automated patching and update management for development tools. Developers often resist these practices because they can, in the near term, disrupt workflows with a river of alerts touting irrelevant vulnerabilities and requesting upgrades of dependencies that could actually break the application. With prim and proper tuning, and by using the right scanning and dependency management systems, DevOps and Platform teams can tune these variables to moderate noise and maximize signal.

With great market share comes even greater responsibility

The dominance of open source developer tools is a testament to their value in the software development landscape. However, with this dominance comes a responsibility to manage the associated supply chain risks. By acknowledging these risks and taking proactive steps to mitigate them, we can continue to harness the power of open source while ensuring the security of our software supply chains. This represents yet another distinct attack surface likely to receive attention from bad actors. It also represents an opportunity to lock down the most critical tools in the organization — the ones that forge the code that, in turn, runs the world. 

KEYWORDS: open source security supply chain risk supply chain security zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Randall headshot

Randall Degges is the Head of Developer Relations and Community at Snyk. Photo courtesy of Degges. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    98% of organizations have been impacted by a cyber supply chain breach

    See More
  • code on computer

    Can developers reduce open source cybersecurity risk?

    See More
  • supply-chain-freepik1170.jpg

    A blueprint for cyber supply chain risk management

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products

Events

View AllSubmit An Event
  • June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    ON DEMAND: For today's security teams, making informed decisions in the first moments of a crisis is critical.
  • May 14, 2012

    Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

    Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing