You secured your code dependencies, is that enough?

OWASP London

2025/06/26

Slides

Video

AI Generated Summary

This talk at OWASP London June 2025 by Anant Shrivastava (Chief Researcher, Siphonoid Research) challenges the common focus on securing code dependencies and explores what else beyond source code we’re ignoring in software supply chain security.

Speaker Background

Key Topics

Why Supply Chain Security Now:

Industry Reaction:

Why Bigger Problem Now:

Supply Chain Beyond Code:

CI/CD Systems:

What Do We Do:

Key Insights:

Actionable Takeaways:

  1. Supply chain security not new - going to be topmost issue in 2030
  2. Industry does bare minimum - collective failure
  3. Beyond code dependencies - developer environments, extensions, packages, CI/CD, containers
  4. Developer machines have lots of credentials and admin access
  5. ATOM: Awareness, Trust but verify, Ongoing monitoring, Measure and map
  6. Observability crucial - can you ask “how many systems have log4j.jar?”
  7. Resources: extensionauditor.com, OSQuery, signed commits
  8. What you see is not what you get - curl | bash problems
  9. Chrome extensions have file system and hardware access
  10. VS Code extensions - verification only means owns domain
  11. Cursor/Windsurf - prompt injection in hidden Unicode
  12. CI/CD - who watches the watchers?
  13. Container images - are you sure downloading official?
  14. Dependency caching - can be poisoned
  15. Bait and switch - intentional or good intentions then sold