Know your code—and know your stuff!

By : Krishna Anindyo | Tuesday, July 07 2020 - 07:00 IWST

An Open Source Audit Digs Into a Codebase to See What’s Inside
An Open Source Audit Digs Into a Codebase to See What’s Inside

INDUSTRY.co.id - The nature of open source use makes it hard to track. Open source in a codebase typically results from the collective decisions of individual developers. A developer faced with a gap in functionality might cast about the internet for a “puzzle piece” — an open source component, a code snippet — that fits. The result: A puzzle completed in less time, with less effort, than if your developers had to craft each piece from scratch.

But some developers are more savvy than others about vetting the components they ingest on their company’s behalf. And without proper vetting, those components can embed quality, security, and license issues into the finished project.

Tracking trends in open source use through audits

It’s a challenge to track open source within companies (though software composition analysis makes the job more manageable). It’s even harder to do so at the industry level. But understanding industry wide open source trends is essential to crafting best practices that keep your development organization ahead of the game.

So how can we get a complete picture of what’s going on in the industry? Through data aggregated from open source software audits. In open source audit, the audit team pries open a codebase to see what’s inside.

The results of one audit are almost always surprising. And when we combine the data from thousands of audits, we see clear patterns in open source use that every development organisation should be aware of.

Making sense of our open source audit data

My Black Duck Audit Services team analyses more code for open source than anyone in the world, across all industries and technologies. Through brute force, for the last four years, we’ve been digging into codebases and aggregating anonymised data on code composition, legal issues, security issues, and other operational factors.

Recently, working with the Synopsys Cybersecurity Research Center (CyRC), we published our 2020 Open Source Security and Risk Analysis report, a great bedtime read for anyone in software.

Below are some highlights of what we found across over 1,250 codebases we reviewed in open source audits in 2019. But you really should download the report to get more details and a breakout by industry.

You may also want to check out our open source in M&A webinar, in which I put the results in the M&A context. “Phil really knows his stuff,” one participant commented at the end. But that’s shooting a compliment at the messenger. The reality is Synopsys knows its stuff when it comes to open source.

Software composition

Virtually every codebase reviewed in an audit last year (99%) included some open source.

Most of the code in these codebases, 70%, was open source.

The average codebase contained about 445 open source components.

License risk

73% of the codebases had at least one license issue.

67% of the codebases contained components with license conflicts, most frequently GNU GPL conflicts.

Security risk

75% of codebases under audit contained open source components with unpatched vulnerabilities.

The percentage of codebases containing high-risk vulnerabilities increased to 49% in 2019.

Yes, Synopsys, with the CyRC and Black Duck Audit Services team, knows its stuff. After you read the report, you’ll know your open source stuff too!

News Comment

Today's Industry

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Kamis, 06 Agustus 2020 - 18:15 WIB

Securing More with Less — How to Maximise Security Coverage while Reducing Costs Usings Hacker-Powered Security

Remember those days, pre-pandemic, when you thought your security scope was complex? But now, with employees working from home, new video and collaboration apps being rolled into daily workflows,…

Trisha Paine, Head of Cloud Marketing Programs, at Check Point Software Technologies

Kamis, 06 Agustus 2020 - 17:30 WIB

Striving to Achieve High Fidelity Cloud Security

Several attributes make posture management a particularly challenging component of maintaining cloud security. For starters, you cannot secure or scale a rapidly growing quantity and variety…

Luke Tucker, Senior Director of Community at HackerOne (Photo by Linkedin)

Rabu, 05 Agustus 2020 - 22:00 WIB

Security Engineers by Day, Hackers by Night – An Interview with Two of Singapore’s Top Ethical Hackers

Over the years, the perception of the term “hacker” has changed. Once seen as only criminals, there are now over 800,000 registered security professionals on HackerOne, the world’s trusted…

Patrick Carey, Director of Product Marketing, Synopsys (Photo by Linkedin)

Rabu, 05 Agustus 2020 - 21:45 WIB

Developers are Not Security Experts, but They can be with The Right Tools

Software has revolutionised the way in which we work, live and play. This is particularly true in the realm of software security, as development teams are releasing code faster than ever before.

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Rabu, 05 Agustus 2020 - 21:25 WIB

5 Reasons Why You Need Collaborative Automation For Today's World

The benefits of collaborative automation are undisputed – more profitability, productivity, flexibility, higher quality and even more employee satisfaction.