Chris Wysopal, Veracode Chief Technology Officer and Co-Founder, recently sat down to discuss the open source supply chain attack on the popular npm repository. Below is the transcript and corresponding video of his reaction.
If it8217;s password-stealing code, it8217;s going to grab the passwords and send them to the attackers. In the case of crypto miners, it8217;s going to suck up resources and CPU time and send the money to the attacker8217;s wallets.
It’s important if you8217;re using any kind of open source – which 99 percent of people building applications are – to use an open source software composition analysis (SCA) tool. What that can do is determine what open source you8217;re using. Veracode SCA does this. Another important thing to do is make sure the vulnerability database that your SCA tool uses is current and up to date.
At Veracode, we scan all the open source repos every single night. When this malicious code was inserted, we detected it right away. All of our customers were alerted that if they8217;re using this version of the code, they need to update to the non-vulnerable version immediately.
Veracode’s recent State of Software Security: Open Source Edition report shows that 79 percent of the open source libraries that developers include are set it and forget it, which means they include it once and they never update it. But the updates tend to be relatively straightforward. In fact, 92 percent of open source flaws can be fixed with an update. And 69 percent of updates are a minor version change or less.
It is really important to have good and timely information about the vulnerabilities in the libraries you8217;re using and a good process for updating the libraries … hopefully in a very automated manner. That way you8217;re updating these libraries without any manual effort, probably in minutes or hours instead of months. That could be the difference between an attacker compromising you or not.
This is why it8217;s so important to stay on top of all the known vulnerabilities in the open source libraries you8217;re using as part of your application, because when you include that third-party code, your application is likely to become vulnerable to those same problems.
Don’t fall victim to an open source attack. Learn how Veracode Software Composition Analysis can protect your code.
Want to stay up to date on the latest Veracode news? Sign up for our monthly newsletter.