{"id":28055,"date":"2019-07-18T11:00:00","date_gmt":"2019-07-18T11:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/edge\/theedge\/the-truth-about-vulnerabilities-in-open-source-code\/b\/d-id\/1335187"},"modified":"2019-07-18T11:00:00","modified_gmt":"2019-07-18T11:00:00","slug":"the-truth-about-vulnerabilities-in-open-source-code","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/","title":{"rendered":"The Truth About Vulnerabilities in Open Source Code"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">Turns out the problem isn&#8217;t with the code itself, experts say.<\/span> <\/p>\n<div class=\"docimage\" align=\"center\"><a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/the-truth-about-vulnerabilities-in-open-source-code\/b\/d-id\/1335187?_mc=rss%5Fx%5Fdrr%5Fedt%5Faud%5Fdr%5Fx%5Fx%2Drss%2Dsimple&amp;image_number=1\" target=\"new\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"docimage\" src=\"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg\" alt border=\"0\"><\/a><\/div>\n<p>Nearly 60% of all codebases used by enterprises contain at least one vulnerability from open source components, according to the &#8220;<span><a href=\"https:\/\/www.synopsys.com\/software-integrity\/resources\/analyst-reports\/2019-open-source-security-risk-analysis.html\">Open Source Security and Risk Analysis<\/a><\/span>&#8221; (OSSRA) report, published by Black Duck by Synopsys.&nbsp;&nbsp;<\/p>\n<p>As worrisome as that might sound, the reality is that whether it&#8217;s proprietary code or open source code, software will inevitably have vulnerabilities. But experts overwhelmingly agree that open source code libraries are far more secure than commercial software.<\/p>\n<p>The problem isn&#8217;t in the use of open source libraries. Software vulnerabilities exist because writing secure code is very difficult \u2014 which is one reason why so many companies rely on open source projects.<\/p>\n<p>&#8220;Open source code isn&#8217;t intrinsically more secure; it is more securable,&#8221; says Justin Hutchings, senior product manager, security at GitHub. &#8220;If [companies] write less custom code, there&#8217;s a smaller chance that they&#8217;ll introduce novel security issues. However, using open source also requires that companies remain as diligent about updating their open source dependencies as they would be about updating their own code.&#8221;<\/p>\n<p><strong>Driving Innovation with Open Source<\/strong><strong><br \/><\/strong> To stay competitive, companies need to use open source code, says Bart Copeland, CEO of ActiveState. &#8220;Today, in any organization, if you are not using open source, you will be left irrelevant,&#8221; he says. &#8220;The only way to drive innovation, speed, quality, and cost is by adopting open source.&#8221;<\/p>\n<p>It&#8217;s about focusing on where you add value, Copeland adds. In areas where an organization itself doesn&#8217;t add value, it relies on other people. The same is true for developing software applications. &#8220;There is a host of applications out there that are not core to your business, and that&#8217;s where open source comes in,&#8221; Copeland says.<\/p>\n<p><strong>Where Are the Vulnerabilities?<\/strong><strong><br \/><\/strong> The problem of seeing the same vulnerabilities over and over again is not in the open source code but in the lack of scanning and monitoring of the different libraries enterprises use to develop products.<\/p>\n<p>&#8220;If developers are using open source libraries to develop their products and there is a vulnerability, the risk belongs to the organization,&#8221; says Chris Eng, chief research officer at Veracode. Because applications are increasingly being assembled from open source components, the potential for vulnerabilities turning into risk is magnified.<\/p>\n<p>Unfortunately, many organizations don&#8217;t know where their risks are because they are not managing the software or the versions of the software they are running, even though tools are available to help mitigate and manage software risks.<\/p>\n<p>&#8220;What it boils down to is that you don&#8217;t know what you don&#8217;t know,&#8221; says Cody Brocious, hacker and head of hacker education at HackerOne. &#8220;We haven&#8217;t done a great job of educating people on managing their networks from a security frame of mind, which includes having audit logs around creating new servers and knowing what software is being used.&#8221;<\/p>\n<p>Most organizations don&#8217;t have a clearly defined policy that ensures developers who want to use a piece of software go through an authorization process. &#8220;There is not a lot of direct return on that investment,\u201d Brocious says. &#8220;People don&#8217;t think about those processes, and developing and adhering to policies costs money.&#8221;<\/p>\n<p><strong>Vulnerability vs. Risk<\/strong><strong><br \/><\/strong> Worth repeating in any conversation about open source code vulnerabilities is that the bugs are from the software libraries, not the applications themselves. And because open source libraries are used in a whole slew of applications, those vulnerabilities can affect a large swath of applications.<\/p>\n<p>&#8220;In most cases, though, those library vulnerabilities don&#8217;t reduce the security of the application. The libraries aren&#8217;t used in a way that makes them vulnerable,\u201d Brocious says.<\/p>\n<p>While the risk should always be considered in context, it&#8217;s important to note the difference between the technical aspect and what an attacker can actually do with the vulnerability. Still, bear in mind that users don&#8217;t care how the software is built.<\/p>\n<p>&#8220;When the Equifax breach happened, users weren&#8217;t lining up to sue The Apache Foundation, but the vulnerability started in their Struts library,&#8221; GitHub&#8217;s Hutchings says.<\/p>\n<p><strong>Managing Open Source Risk<\/strong><strong><br \/><\/strong> Because a lot of enterprises don&#8217;t know what software they are running in the first place, when a vulnerability is detected, it&#8217;s difficult to look at their networks and know whether and where they might be running a version of the software.<\/p>\n<p>&#8220;The problem here is that many organizations fail to keep track of released updates in third-party components combined with the transparency of the open source community,&#8221; says Craig Young, computer security researcher for Tripwire&#8217;s VERT (Vulnerability and Exposure Research Team). &#8220;Vendors often use open source as a way of cutting down costs and getting to market faster without realizing the need to closely track these components for security or licensing issues.&#8221;<\/p>\n<p>In general, Young adds, organizations that have forged ahead without the proper policies are likely lacking the expertise necessary to effectively catalogue and manage their software. While it might be helpful to look outside the organization for help, there are also scanning tools for licensure that are able to go through and search for common code patterns and attribute them back to the original project.<\/p>\n<p>Regularly looking at the list of their open source inventory is a key risk mitigation strategy for organizations, as is knowing which open source components are in different products. Companies need to have a policy for cataloguing the software they are running and managing vulnerabilities in that software.<\/p>\n<p>&#8220;It really comes down to first knowing all the applications that they have,&#8221; Eng says. &#8220;Some companies don&#8217;t even have that. For others, that information is scattered around. There are a lot of different ways for somebody to put up an application that a CISO might not know [is] there.&#8221;<\/p>\n<p>CISOs are making efforts to move toward a place where they have access to the most up-to-date information so that when something comes out, they can react to it and minimize the risk to the business and the risk to exposure.&nbsp;<\/p>\n<p>&#8220;Reliance on open source is only going to get bigger as organizations are asked to innovate more quickly,&#8221; Eng says. &#8220;The speed of innovation is going to make this problem a little harder, and it&#8217;s probably going to get a little bit worse before it gets better.&#8221;<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<p><span class=\"italic\">Kacy Zurkus is a cybersecurity and InfoSec freelance writer as well as a content producer for Reed Exhibition&#8217;s security portfolio. Zurkus is a regular contributor to Security Boulevard and IBM&#8217;s Security Intelligence. She has also contributed to several publications, &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=5194\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/the-truth-about-vulnerabilities-in-open-source-code\/b\/d-id\/1335187?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Turns out the problem isn&#8217;t with the code itself, experts say. Read More <a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/the-truth-about-vulnerabilities-in-open-source-code\/b\/d-id\/1335187?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-28055","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Truth About Vulnerabilities in Open Source Code 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Truth About Vulnerabilities in Open Source Code 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-18T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Truth About Vulnerabilities in Open Source Code\",\"datePublished\":\"2019-07-18T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/\"},\"wordCount\":1122,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/1335254\\\/5.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/\",\"name\":\"The Truth About Vulnerabilities in Open Source Code 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/1335254\\\/5.jpg\",\"datePublished\":\"2019-07-18T11:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/1335254\\\/5.jpg\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/1335254\\\/5.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-truth-about-vulnerabilities-in-open-source-code\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Truth About Vulnerabilities in Open Source Code\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Truth About Vulnerabilities in Open Source Code 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/","og_locale":"en_US","og_type":"article","og_title":"The Truth About Vulnerabilities in Open Source Code 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-18T11:00:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Truth About Vulnerabilities in Open Source Code","datePublished":"2019-07-18T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/"},"wordCount":1122,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/","url":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/","name":"The Truth About Vulnerabilities in Open Source Code 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg","datePublished":"2019-07-18T11:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/1335254\/5.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-truth-about-vulnerabilities-in-open-source-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The Truth About Vulnerabilities in Open Source Code"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28055"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28055\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}