Niels Tanis
Reviewing 3rd party library security easily using OpenSSF Scorecard
#1about 4 minutes
Understanding the inherent risks of third-party dependencies
The vast majority of an application's code comes from third-party libraries, creating significant risk as shown by the Log4j vulnerability.
#2about 2 minutes
How malicious actors infiltrate open source projects
Malicious actors can introduce backdoors into trusted projects over long periods, as demonstrated by the XZ Utils supply chain attack.
#3about 2 minutes
Detecting known vulnerabilities and hidden package dependencies
Tooling can help identify publicly disclosed vulnerabilities, but risks remain from unmanaged or hidden dependencies bundled within packages.
#4about 2 minutes
Introducing OpenSSF Scorecard as a software nutrition label
OpenSSF Scorecard provides a "nutrition label" for open source projects by running automated checks to assess their security posture.
#5about 3 minutes
Breaking down key security checks in Scorecard
Scorecard evaluates projects based on the presence of known vulnerabilities, automated dependency updates, security policies, and the use of testing like fuzzing and SAST.
#6about 3 minutes
Evaluating project health and build process integrity
Scorecard assesses repository health through checks for branch protection, code reviews, contributor diversity, pinned dependencies, and signed releases.
#7about 2 minutes
Applying Scorecard to analyze a real-world package
A practical demonstration shows how to run Scorecard against a popular library like Newtonsoft.Json and use its API to analyze transitive dependencies.
#8about 3 minutes
Correlating Scorecard results with real-world security data
Research shows a strong correlation between higher OpenSSF Scorecard scores and better security outcomes, such as fewer vulnerabilities and more active maintenance.
#9about 3 minutes
Exploring the future of automated security analysis
Future improvements in security tooling should focus on deeper analysis like coverage-based fuzzing, data-flow SAST, build reproducibility, and community-based auditing.
#10about 1 minute
Final takeaways on integrating Scorecard into your workflow
Scorecard is a valuable tool for assessing project health but should be used as part of a broader security strategy, not as an end goal.
Related jobs
Jobs that call for the skills explored in this talk.
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Real-World Security for Busy Developers
Kevin Lewis
Open Source Secure Software Supply Chain in action
Natale Vinto
How GitHub secures open source
Joseph Katsioloudes
Simple Steps to Kill DevSec without Giving Up on Security
Isaac Evans
Security in modern Web Applications - OWASP to the rescue!
Jakub Andrzejewski
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Coffee with Developers with Feross Aboukhadijeh of Socket about the xz backdoor
Feross Aboukhadijeh
From learning to earning
Jobs that call for the skills explored in this talk.


Software Development Engineer-Security Automation, AWS Security OpRes
Amazon
Canton de Courbevoie-1, France
Java
Linux
NoSQL
Python
TypeScript
+2
Security Architect
Codasip
Dresden, Germany
Security Architect
Codasip
Berlin, Germany
Software Engineer - High Security Clearance
Open Source Recruitment Limited
Cheltenham, United Kingdom
€50K
PHP
Java
Ruby
Python
+2


