Dependency Risk Definition Dependency risk is the security risk introduced by direct and transitive third-party libraries, frameworks, packages, and their update and trust patterns. Why it matters Dependencies expand the codebase, privilege surface, and maintenance burden beyond what the product team directly writes. Risk comes not only from known CVEs, but from maintenance quality, version drift, trust decisions, and package ecosystem abuse. Keep the boundary tight: this note is about upstream package trust and maintenance exposure, not artifact tampering or release traceability after the build. Attacker perspective Attackers look for: - outdated packages with known issues - poorly maintained libraries - dependency confusion and typosquatting opportunities - transitive packages nobody is watching Defender perspective Defenders should: - minimize dependency count where sensible - track direct and transitive dependencies - prioritize based on reachability and impact, not raw count alone - establish update and retirement discipline Practical examples a vulnerable package lingers because nobody owns update cadence a transitive dependency introduces risk the team did not know existed package trust is assumed because “it is popular” Related notes supply-chain-security sbom-and-provenance ci-cd-hardening image-scanning References Foundational: OWASP Software Supply Chain Security Cheat Sheet — https://cheatsheetseries.owasp.org/cheatsheets/Software_Supply_Chain_Security_Cheat_Sheet.html Foundational: NIST SP 800-218 SSDF — https://csrc.nist.gov/pubs/sp/800/218/final ← PreviousContainer SecurityNext →Image Scanning Explore nearby notes DevSecOpsArtifact IntegrityArtifact integrity is the assurance that build outputs, packages, images, and release artifacts have not been tampered with and can be traced back to the intended... DevSecOpsASVS as Dev Process InputThis note treats OWASP ASVS not as a post-hoc checklist, but as a development-process input for designing, reviewing, and verifying technical security controls... DevSecOpsBranch Protection and Release ControlsBranch protection and release controls are the rules and governance mechanisms that determine who can change protected code paths, approve releases, and promote... DevSecOpsCI/CD HardeningCI/CD hardening ice of securing the build, test, and deployment pipeline so that automation becomes a trusted control path rather than an attack amplifier. DevSecOpsContainer SecurityContainer security is the practice of reducing risk in how containerized applications are built, configured, shipped, and run. DevSecOpsImage ScanningImage scanning is the process of inspecting container images for known vulnerabilities, risky packages, and other issues before promotion or deployment.