Niels Tanis
Reviewing 3rd party library security easily using OpenSSF Scorecard
#1about 4 minutes
Understanding the inherent risks of third-party dependencies
The vast majority of an application's code comes from third-party libraries, creating significant risk as shown by the Log4j vulnerability.
#2about 2 minutes
How malicious actors infiltrate open source projects
Malicious actors can introduce backdoors into trusted projects over long periods, as demonstrated by the XZ Utils supply chain attack.
#3about 2 minutes
Detecting known vulnerabilities and hidden package dependencies
Tooling can help identify publicly disclosed vulnerabilities, but risks remain from unmanaged or hidden dependencies bundled within packages.
#4about 2 minutes
Introducing OpenSSF Scorecard as a software nutrition label
OpenSSF Scorecard provides a "nutrition label" for open source projects by running automated checks to assess their security posture.
#5about 3 minutes
Breaking down key security checks in Scorecard
Scorecard evaluates projects based on the presence of known vulnerabilities, automated dependency updates, security policies, and the use of testing like fuzzing and SAST.
#6about 3 minutes
Evaluating project health and build process integrity
Scorecard assesses repository health through checks for branch protection, code reviews, contributor diversity, pinned dependencies, and signed releases.
#7about 2 minutes
Applying Scorecard to analyze a real-world package
A practical demonstration shows how to run Scorecard against a popular library like Newtonsoft.Json and use its API to analyze transitive dependencies.
#8about 3 minutes
Correlating Scorecard results with real-world security data
Research shows a strong correlation between higher OpenSSF Scorecard scores and better security outcomes, such as fewer vulnerabilities and more active maintenance.
#9about 3 minutes
Exploring the future of automated security analysis
Future improvements in security tooling should focus on deeper analysis like coverage-based fuzzing, data-flow SAST, build reproducibility, and community-based auditing.
#10about 1 minute
Final takeaways on integrating Scorecard into your workflow
Scorecard is a valuable tool for assessing project health but should be used as part of a broader security strategy, not as an end goal.
Related jobs
Jobs that call for the skills explored in this talk.
MARKT-PILOT GmbH
Stuttgart, Germany
Remote
€75-90K
Senior
Java
TypeScript
+1
Picnic Technologies B.V.
Amsterdam, Netherlands
Senior
Java
Amazon Web Services (AWS)
+1
VECTOR Informatik
Stuttgart, Germany
Senior
Java
IT Security
Matching moments
05:01 MIN
Comparing the security models of browsers and native apps
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
06:46 MIN
How AI-generated content is overwhelming open source maintainers
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
09:38 MIN
Technical challenges of shipping a cross-platform browser
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
03:16 MIN
Improving the developer feedback loop with specialized tools
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
03:58 MIN
Making accessibility tooling actionable and encouraging
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
09:00 MIN
Navigating the growing complexity of modern CSS
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Real-World Security for Busy Developers
Kevin Lewis
How GitHub secures open source
Joseph Katsioloudes
Simple Steps to Kill DevSec without Giving Up on Security
Isaac Evans
Open Source Secure Software Supply Chain in action
Natale Vinto
Security in modern Web Applications - OWASP to the rescue!
Jakub Andrzejewski
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Confideck GmbH
Vienna, Austria
Remote
Intermediate
Senior
Node.js
MongoDB
TypeScript





Oops
Amsterdam, Netherlands
Senior
C
C++
VHDL
Scripting (Bash/Python/Go/Ruby)


Working Class Heroes
Rotterdam, Netherlands
Remote
DNS
Bash
Linux
Python
+5

SAP AG
Berlin, Germany
Kali Linux