Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Risks, emerging when developing or using open-source software

0
Medium
Vulnerabilityrce
Published: Thu Apr 02 2026 (04/02/2026, 20:33:43 UTC)
Source: Kaspersky Security Blog

Description

How the popularization of AI and the simplification of development are creating new risks for corporate security.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:19:06 UTC

Technical Analysis

This threat analysis focuses on the emerging risks associated with the widespread use of open-source software (OSS) in corporate environments, exacerbated by the rapid adoption of AI-assisted development. Open-source components are integral to modern software but present unique challenges: vulnerability data is often incomplete, inconsistent, or delayed, with many vulnerabilities lacking CVSS scores, impeding effective prioritization and patching. Legacy OSS components, which are no longer maintained or patched, remain embedded in many corporate projects, creating persistent security liabilities that standard patch management cannot address. Additionally, malicious packages in OSS registries have proliferated dramatically, with attackers leveraging compromised maintainer credentials or publishing deceptive packages to infiltrate supply chains. AI agents, while accelerating development, frequently introduce vulnerabilities due to training on outdated or flawed codebases and often recommend obsolete or non-existent dependencies, increasing the risk of dependency confusion and other attacks. Attempts to use AI for automated vulnerability detection and patching are limited by the same data deficiencies and complexity of dependency chains. The threat landscape is further complicated by the growing volume of vulnerabilities and the slow pace of vulnerability disclosure and scoring. Effective mitigation requires expanding vulnerability management to include open-source package policies, AI usage governance, comprehensive dependency mapping, and integration of threat intelligence feeds. This multi-faceted approach is essential to address the sophisticated and evolving nature of OSS-related risks in the AI era.

Potential Impact

Organizations worldwide face increased risk of supply chain attacks, data breaches, and operational disruptions due to unpatched or malicious open-source components embedded in their software. The lack of reliable vulnerability data and delayed reporting prolong exposure windows, increasing the likelihood of exploitation. Legacy OSS components that cannot be patched create persistent vulnerabilities that attackers can exploit to gain unauthorized access or execute remote code. The surge in malicious OSS packages threatens the integrity of development pipelines and production environments, potentially leading to credential theft, infrastructure compromise, and espionage. AI-generated code vulnerabilities and dependency confusion attacks further amplify these risks, potentially allowing attackers to introduce backdoors or disrupt services. The complexity and opacity of dependency chains hinder detection and remediation efforts, increasing the attack surface. These impacts can lead to significant financial losses, reputational damage, regulatory penalties, and erosion of customer trust. Small and medium businesses, often lacking dedicated security resources, are particularly vulnerable. The threat also challenges existing security tools and processes, necessitating investment in advanced security solutions and expertise.

Mitigation Recommendations

1. Implement comprehensive software composition analysis (SCA) tools capable of deep dependency mapping, including transitive dependencies, to gain full visibility into OSS components and versions used. 2. Integrate multiple threat intelligence feeds specialized in open-source vulnerabilities and malicious package detection to enhance vulnerability prioritization and reduce false positives. 3. Establish strict open-source package usage policies, including vetting, approval workflows, and restrictions on unmaintained or legacy components. 4. Regularly audit and systematically remove or replace obsolete and unsupported OSS components to eliminate unpatchable vulnerabilities. 5. Enforce security controls and operational guidelines for AI-assisted development, including validation of AI-generated code, dependency version verification, and restricting AI agents’ access to sensitive credentials. 6. Employ runtime protection and cloud workload security solutions to detect and mitigate exploitation attempts in production environments. 7. Train development and security teams on OSS supply chain risks and AI-related vulnerabilities to improve awareness and response capabilities. 8. Collaborate with OSS communities and vendors to encourage timely vulnerability disclosures and patching. 9. Use multi-source vulnerability databases and cross-reference CVSS scores to compensate for inconsistencies and gaps in public data. 10. Monitor for signs of dependency confusion and implement namespace and package name verification controls in CI/CD pipelines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/open-source-vulnerabilities-in-ai-era/55543/","fetched":true,"fetchedAt":"2026-04-02T23:17:09.848Z","wordCount":1887}

Threat ID: 69cef91ee6bfc5ba1d055051

Added to database: 4/2/2026, 11:17:50 PM

Last enriched: 4/2/2026, 11:19:06 PM

Last updated: 4/3/2026, 1:31:35 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses