Insights into Open Source Software Usage and Security
March 11, 2025

David A. Wheeler
OpenSSF

Open source software (OSS) is a cornerstone of modern digital infrastructure, driving innovation and supporting applications across industries and regions. With its pervasive use, identifying critical OSS components and addressing their security challenges are vital. The recent Census III report(link is external), conducted by the Linux Foundation and the Laboratory for Innovation Science at Harvard, provides key insights into the OSS ecosystem. Analyzing over 12 million OSS library observations from 10,000 organizations, the study highlights what is really happening in OSS, including trends shaping the future of digital technology.


Massive Increase in Cloud Service Integration

One striking revelation from Census III is the surge in OSS libraries for cloud service integration. This suggests an ongoing shift from the earlier "lift-and-shift" approach for using clouds, in which organizations moved existing applications to the cloud with minimal changes. Today, software developers increasingly create software natively for the cloud, leveraging its unique capabilities through OSS libraries. This trend reflects a deeper adoption of cloud-first strategies in software development.

Security Risks in Single-Maintainer Projects

The report also identifies a significant concern in some OSS — some critical widely used OSS components are projects with essentially a single maintainer. This doesn't apply to all OSS; many widely used OSS projects have many maintainers. Still, of the top 50 non-npm projects in our "version-agnostic direct list," 17% had one developer, accounting for more than 80% of commits authored.

This also doesn't mean that those solo maintainers are doing a bad job — there are good reasons some single-maintainer projects are widely used. However, if that single maintainer dies or stops maintaining the project, that may end its sustainment. In addition, single-maintainer projects may get less review. It's important to find ways to increase the number of trustworthy maintainers in important OSS projects.

Lesson from the Python 2 to 3 Transition

Despite being released 16 years ago, Python 3 adoption remains incomplete, with some still relying on Python 2. There has been progress; the majority of Python use is now version 3, though Python 2 use remains significant in some sectors (29% of Python in data analysis uses Python 2). This progress in Python 3 growth was greatly enabled by the Python package "six," a set of utility functions designed to make it easier to write Python code that is compatible with both Python 2 and Python 3. The package "six" is now one of the most widely used OSS packages in the world today.

The lesson is simple: it's important that software developers make it extremely easy for users to update to newer versions. Projects that maintain backward compatibility minimize disruption, reduce friction, and accelerate adoption. The Linux kernel exemplifies this principle with its "don't break userspace" policy, which ensures that updates do not disrupt existing workflows. If the kernel can uphold this standard while processing over 800 commits daily, other projects can and should adopt similar approaches to balance innovation with usability.

Rust's Role in Enhancing Security

Another noteworthy trend is the increasing adoption of Rust, a memory-safe programming language. System-level projects like the Linux kernel and the widely used curl tool are beginning to incorporate Rust to mitigate vulnerabilities inherent in memory-unsafe languages such as C and C++. This gradual adoption indicates a broader industry shift toward memory-safe development practices.

The Case for Standardized Software Identifiers

A key takeaway from Census III is the need for standardized identifiers to accurately track software dependencies and vulnerabilities. Current naming ambiguities create confusion and inefficiencies, particularly in addressing security issues. Vulnerability reports are less valuable if people can't automatically determine what software is vulnerable.

Adopting package URLs (purls) as a standard identifier, where practical, would streamline vulnerability tracking and resolution. Governments and organizations must prioritize such standardization to strengthen OSS security. For example, I would love to see the CVE process require that all reported vulnerabilities include at least one mechanically processable software ID, such as a purl.

Strengthening the Open Source Ecosystem

Census III shows the immense value of the open source ecosystem. There are millions of OSS packages, and the most popular ones are used across society. However, vulnerabilities in widely used OSS can also cause serious problems. The findings reveal a dual imperative — supporting maintainers of widely used OSS projects and implementing systemic measures to enhance security.

Simply improving the most popular OSS isn't enough, of course. One of the most common attacks on users of OSS involves convincing developers to download the wrong OSS package. This includes "typosquatting," which involves creating malicious packages with names similar to popular ones to deceive developers into installing them, and "dependency confusion," in which malicious packages are uploaded to public repositories with the same names as internal dependencies. So improving popular OSS as well as strengthening the overall OSS ecosystem are both important.

To address security risks, the Linux Foundation's Open Source Security Foundation (OpenSSF) spearheads initiatives such as Alpha-Omega, which funds efforts to improve the security of critical OSS projects and lower the barriers to entry for new developers on some projects. Additionally, tools like Sigstore and SLSA enhance the OSS supply chain by making it more likely that the source code reviewed by the community matches what users deploy in production environments.

The partnership between the Linux Foundation, Harvard University, and industry leaders in producing this report demonstrates the collective effort to improve the security and sustainability of open source software. By addressing the challenges outlined in Census III, we can ensure OSS continues to drive innovation while safeguarding the digital infrastructure that depends on it.

David A. Wheeler is Director of Open Source Supply Chain Security at OpenSSF
Share this

Industry News

April 14, 2025

LambdaTest announced the launch of the HyperExecute MCP Server, an enhancement to its AI-native test orchestration platform, HyperExecute.

April 14, 2025

Cloudflare announced Workers VPC and Workers VPC Private Link, new solutions that enable developers to build secure, global cross-cloud applications on Cloudflare Workers.

April 14, 2025

Nutrient announced a significant expansion of its cloud-based services, as well as a series of updates to its SDK products, aimed at enhancing the developer experience by allowing developers to build, scale, and innovate with less friction.

April 10, 2025

Check Point® Software Technologies Ltd.(link is external) announced that its Infinity Platform has been named the top-ranked AI-powered cyber security platform in the 2025 Miercom Assessment.

April 10, 2025

Orca Security announced the Orca Bitbucket App, a cloud-native seamless integration for scanning Bitbucket Repositories.

April 10, 2025

The Live API for Gemini models is now in Preview, enabling developers to start building and testing more robust, scalable applications with significantly higher rate limits.

April 09, 2025

Backslash Security(link is external) announced significant adoption of the Backslash App Graph, the industry’s first dynamic digital twin for application code.

April 09, 2025

SmartBear launched API Hub for Test, a new capability within the company’s API Hub, powered by Swagger.

April 09, 2025

Akamai Technologies introduced App & API Protector Hybrid.

April 09, 2025

Veracode has been granted a United States patent for its generative artificial intelligence security tool, Veracode Fix.

April 09, 2025

Zesty announced that its automated Kubernetes optimization platform, Kompass, now includes full pod scaling capabilities, with the addition of Vertical Pod Autoscaler (VPA) alongside the existing Horizontal Pod Autoscaler (HPA).

April 08, 2025

Check Point® Software Technologies Ltd.(link is external) has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report.

April 08, 2025

GitHub announced the general availability of security campaigns with Copilot Autofix to help security and developer teams rapidly reduce security debt across their entire codebase.

April 08, 2025

DX and Spotify announced a partnership to help engineering organizations achieve higher returns on investment and business impact from their Spotify Portal for Backstage implementation.

April 07, 2025

Appfire announced its launch of the Appfire Cloud Advantage Alliance.