Niels Tanis
Reviewing 3rd party library security easily using OpenSSF Scorecard
#1about 4 minutes
Understanding the inherent risks of third-party dependencies
The vast majority of an application's code comes from third-party libraries, creating significant risk as shown by the Log4j vulnerability.
#2about 2 minutes
How malicious actors infiltrate open source projects
Malicious actors can introduce backdoors into trusted projects over long periods, as demonstrated by the XZ Utils supply chain attack.
#3about 2 minutes
Detecting known vulnerabilities and hidden package dependencies
Tooling can help identify publicly disclosed vulnerabilities, but risks remain from unmanaged or hidden dependencies bundled within packages.
#4about 2 minutes
Introducing OpenSSF Scorecard as a software nutrition label
OpenSSF Scorecard provides a "nutrition label" for open source projects by running automated checks to assess their security posture.
#5about 3 minutes
Breaking down key security checks in Scorecard
Scorecard evaluates projects based on the presence of known vulnerabilities, automated dependency updates, security policies, and the use of testing like fuzzing and SAST.
#6about 3 minutes
Evaluating project health and build process integrity
Scorecard assesses repository health through checks for branch protection, code reviews, contributor diversity, pinned dependencies, and signed releases.
#7about 2 minutes
Applying Scorecard to analyze a real-world package
A practical demonstration shows how to run Scorecard against a popular library like Newtonsoft.Json and use its API to analyze transitive dependencies.
#8about 3 minutes
Correlating Scorecard results with real-world security data
Research shows a strong correlation between higher OpenSSF Scorecard scores and better security outcomes, such as fewer vulnerabilities and more active maintenance.
#9about 3 minutes
Exploring the future of automated security analysis
Future improvements in security tooling should focus on deeper analysis like coverage-based fuzzing, data-flow SAST, build reproducibility, and community-based auditing.
#10about 1 minute
Final takeaways on integrating Scorecard into your workflow
Scorecard is a valuable tool for assessing project health but should be used as part of a broader security strategy, not as an end goal.
Related jobs
Jobs that call for the skills explored in this talk.
IGEL Technology GmbH
Bremen, Germany
Senior
Java
IT Security
MARKT-PILOT GmbH
Stuttgart, Germany
Remote
€75-90K
Senior
Java
TypeScript
+1
Picnic Technologies B.V.
Amsterdam, Netherlands
Senior
Java
Amazon Web Services (AWS)
+1
Matching moments
08:00 MIN
The future of cURL security without a bounty program
Don’t Insert Crazy! On cURL and AI Slop - Daniel Stenberg
05:01 MIN
Comparing the security models of browsers and native apps
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
10:54 MIN
How AI threatens the sustainability of open source projects
Don’t Insert Crazy! On cURL and AI Slop - Daniel Stenberg
02:50 MIN
Planning for project continuity and the bus factor
Don’t Insert Crazy! On cURL and AI Slop - Daniel Stenberg
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
09:38 MIN
Technical challenges of shipping a cross-platform browser
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
04:52 MIN
The responsibility of researchers to validate AI findings
Don’t Insert Crazy! On cURL and AI Slop - Daniel Stenberg
00:53 MIN
Why the cURL project shut down its bug bounty program
Don’t Insert Crazy! On cURL and AI Slop - Daniel Stenberg
Featured Partners
Related Videos
Securing your application software supply-chain
Niels Tanis
Real-World Security for Busy Developers
Kevin Lewis
Open Source Secure Software Supply Chain in action
Natale Vinto
How GitHub secures open source
Joseph Katsioloudes
Simple Steps to Kill DevSec without Giving Up on Security
Isaac Evans
Security in modern Web Applications - OWASP to the rescue!
Jakub Andrzejewski
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Confideck GmbH
Vienna, Austria
Remote
Intermediate
Senior
Node.js
MongoDB
TypeScript





Oops
Amsterdam, Netherlands
Senior
C
C++
VHDL
Scripting (Bash/Python/Go/Ruby)


Working Class Heroes
Rotterdam, Netherlands
Remote
DNS
Bash
Linux
Python
+5

SAP AG
Berlin, Germany
Kali Linux