The presentation discusses the findings of a quantitative study of application security and library usage, highlighting the prevalence of flaws in open source software and the importance of prioritizing fixes based on severity.
- Open source software has a variable number and type of flaws, with most flaws coming from transit dependencies.
- Prioritizing fixes based on severity is important, with proof of concept and exploited vulnerabilities taking precedence.
- Language selection can also impact security.
- Most patchable vulnerabilities can be fixed with a minor library update.
- The study provides insights into industry performance and allows for benchmarking against peers.
The study found that transit dependencies are a major source of flaws in open source software, with developers potentially having to manage hundreds of developers when pulling in just one library. Prioritizing fixes based on severity is crucial, as not all flaws require a major refactor of the code. For example, most patchable vulnerabilities can be fixed with a minor library update. Language selection can also impact security, with developers needing to consider the security implications of their language choice. Overall, the study provides valuable insights into industry performance and allows for benchmarking against peers.