RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityApril 1, 2025

OpenSSF guidelines encourage OSS developers to build securely

The Open Source Secure Baseline provides a framework for securing OSS development — but it could breed complacency.

John P. Mello Jr.
John P. Mello Jr., Freelance technology writer.John P. Mello Jr.
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
neon open sign

Developers have always had a conflicted relationship with security. While they don't want to produce software with security flaws, they don't want to be security experts either. With that in mind, the Open Source Security Foundation (OpenSSF) has released the Open Source Project Security Baseline.

The new guidelines for the use of open-source software (OSS) in development provide a structured set of security requirements aligned with international cybersecurity frameworks, standards, and regulations. They are designed to bolster the security posture of OSS projects.

Ben Cotton, baseline co-maintainer and open-source community lead at Kusari, said that while a lot of supply chain compromises via open-source projects happen because maintainers are overwhelmed and don't have time to catch everything, sometimes it's just because maintainers don't necessarily know the best steps to take. That's where the OpenSSF's guidelines fill a gap.

Open-source project maintainers are the backbone of modern software, whether or not they intend to be.

Ben Cotton

Here's what you need to know about OpenSSF's Open Source Project Security Baseline guidelines.

Download Today: 2025 Software Supply Chain Security ReportJoin the SSCS Report Webinar

A new baseline for OSS security is born

OpenSSF said the guidelines represent a baseline via a tiered framework of security practices that evolve with project maturity. The guidelines compile existing guidance from the OpenSSF and other expert groups, outlining tasks, processes, artifacts, and configurations that enhance the security of software development and consumption.

By adhering to the baseline, the OpenSSF noted, developers can lay a foundation that supports compliance with global cybersecurity regulations, such as the EU Cyber Resilience Act (CRA) and the Secure Software Development Framework (SSDF) from the U.S. National Institute of Standards and Technology (NIST).

Stacey Potter, an open-source community manager at Stacklok, said in a statement about the guidelines that it can be tough to navigate security standards, but the guidelines provide a framework that grows with your project.

Our goal is to take the guesswork out of it and help maintainers feel confident about where they stand, without adding extra stress. It’s all about empowering the community and making open source more secure for everyone!

Stacey Potter

Cotton asserted that maintainers of open-source projects — many working on a volunteer basis — are being pressured to tighten their security by corporations that make millions or billions of dollars off a developer's work. "Maintainers shouldn't have to sit there and learn the general concepts behind a bunch of security things," he said.

Obviously, the more security knowledge they have, the better. But we wanted our baseline to be something where a maintainer of an open-source project who wants to meet level one of the baseline can sit down for just a little bit of time and make sure these various settings are enabled.

Ben Cotton

The more maintainers have to figure out on their own, the harder it's going to be to get them to adopt secure practices, Cotton said. "We recognize that you can't just place demands on these communities. There has to be a tangible benefit for them and a minimal burden because so many maintainers are overworked already," he said.

Recognizing OSS diversity is key

The baseline's tiered system of guidance is meant to be a recognition of the diversity of open-source projects that avoids the one-size-fits-all approach of tools such as the SecurityScorecard, Cotton said. With the baseline, the best practices for a project with a small number of maintainers are tailored for that project's size, while other tiers have best practices practical for larger projects with a broader reach and large contributor base.

We should give [maintainers] very focused and directly actionable guidance.

Ben Cott

Cotton said that, while it would be great if every project produced a software bill of materials (SBOM) and every developer did some threat modeling of their software, "we can't expect a group of five people working on this little hobby project of theirs to necessarily have the time or the interest in taking those steps."

One of the criticisms of the scorecard from maintainers is that it's being used by consumers of software — whether it's companies or downstream projects — to evaluate their upstreams and basically say, "Fix this or fix that." "With the baseline, we're very explicitly intending for it to be used by the project maintainers for their project, to give them the tools that they need to take the security steps that are going to benefit the ecosystem more broadly," Cotton said.

Why the baseline is key to securing commercial software

While praising the open-source community's efforts to produce quality code, Mike McGuire, senior security solutions manager at Black Duck Software, warned that those efforts will be blunted if users don't fulfill their role when using OSS.

No matter what is done by project owners, no commercial application will be made any more secure if development organizations don’t invest more in managing the open source that they leverage. If development organizations aren’t tracking the open-source projects that they leverage and are not evaluating them for risk or their adherence to frameworks like the OSPS Baseline, then they will continue to struggle with lingering vulnerabilities.

Mike McGuire

Black Duck's 2025 Open Source Security and Risk Analysis (OSSRA) report found that 81% of commercial codebases contain critical open-source vulnerabilities, with the average age of those vulnerabilities being 2.8 years old. "The overwhelming majority of these vulnerabilities have fixes available, which signals issues on the open-source consumer’s side with managing their dependencies and not an issue on the open-source project side with patching issues," McGuire said.

Could compliance breed complacency?

Jason Soroko, senior vice president of product at Sectigo, appreciates that the new OpenSSF baseline sets a clear and necessary floor for open-source security. "It forces projects to implement essential controls such as MFA and secure versioning that have been long overdue," Soroko said.

However, he warned that compliance could translate into complacency. "This potentially creates a fixed checklist that risks turning security compliance into a destination rather than a journey. Static baselines may lull projects into a false sense of safety as threat landscapes evolve," he said.

The real danger is not the floor itself but the complacency it may breed, Soroko said.

Many developers might stop at level one, meeting only minimum sponsor requirements without advancing their practices. The baseline’s tiered model is meant to spur continuous improvement, but its success hinges on an industry culture that prizes proactive, adaptive security over checkbox compliance. In this light, true security demands innovation beyond static minimums.

Jason Soroko

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?
AI agents risk

Claude Mythos: Get your AppSec game on

Anthropic's new AI is a 'step change' for exposing software flaws — but also ramps up exploits. Are you ready?

Learn More about Claude Mythos: Get your AppSec game on
Claude Mythos: Get your AppSec game on

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top