Open source software, maintained largely by volunteers, is a major security risk for corporations and governments. Vulnerabilities in such code now make it a prime target for cyberattacks by both malicious hackers and state actors. Reports highlight the risks: 82% of open source components are considered risky due to poor maintenance, outdated code, or security flaws. Many of these projects are run by small teams or individual volunteers with limited resources, leaving them vulnerable to attacks.
The xz Utils incident was a major example of just how vulnerable open source security is. Andres Freund, a software engineer at Microsoft, “inadvertently found a backdoor hidden in a piece of software that is part of the Linux operating system.” This backdoor came from the release tarballs for xz Utils, which were tampered with and allowed unauthorised access to systems using affected versions. The source code that was compromised was of the xz Utils open source data compression utility in Linux systems. The engineer prevented a “potentially historic cyberattack.”
Adding to the risks in open-source security is the rise of large language models (LLMs), which can be misused by attackers. However, LLMs offer also offer opportunities to improve open source security by flagging suspicious changes and detecting unusual patterns in contributor behaviours. However, deploying an open source LLM on a server or in a cloud environment introduces the risk of unauthorized access to the model.
Supply chain attacks on open source software are increasing due to the growing reliance on open-source libraries and the rise of sophisticated attack methods like phishing and social engineering. According to Synopsys, vulnerabilities in open source software are increasing. The federal government itself is one of the largest consumers of open source software and will continue to increase its involvement in the space.
Furthermore, state actors remain one of the biggest threats. Open source software offers them a low-cost, high-reward target for espionage, sabotage, and disruption. Governments are likely to get more involved, helping promote public-private partnerships to improve security across the wider ecosystem.
Phishing attacks are already dangerous, they exploit trust rather than breaching technical defenses - tricking individuals into executing malicious code in a trusted environment. Open-source thrives on the contributions of faceless developers who work in good faith, often without direct interaction or verification of identity. However, GenAI undermines this foundation by making it feasible for many of those faceless contributors to be entirely fabricated.
As we enter 2025, open source software is at a critical point. The threats are becoming more sophisticated, driven by state actors, the misuse of AI tools like LLMs, and a focus on supply chain interference. However, with proactive measures, greater investment, and shared responsibility, it’s entirely possible to create a future where open source continues to thrive as a force for innovation and progress.