Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

514+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. The State of Trusted Open Source Report: Key Findings for 2025
The State of Trusted Open Source Report: Key Findings for 2025
NEWS

The State of Trusted Open Source Report: Key Findings for 2025

Chainguard's first-ever State of Trusted Open Source report reveals critical insights into open source consumption patterns across container images, language libraries, and build pipelines — exposing where organizations are taking on undetected supply chain risk.

Dylan H.

News Desk

April 2, 2026
6 min read

Chainguard has published the findings of its first-ever State of Trusted Open Source report, drawing on product telemetry and customer data to provide an unprecedented view into how organizations actually consume open source software. The report covers consumption patterns across container image projects, software versions, language libraries, and build artifacts — and exposes where the industry is systemically taking on supply chain risk without knowing it.

Why This Report Matters

Open source supply chain attacks have become one of the defining security threats of the mid-2020s. From the xz-utils backdoor (2024) to the repeated PyPI and npm package poisoning campaigns attributed to nation-state groups, the compromise of trusted open source components has cascading effects across every organization that depends on them.

Despite this, most organizations have limited visibility into what open source they are actually running, which versions, and whether those versions are maintained or vulnerable. The Chainguard report is among the first to provide data-driven benchmarks for these questions at scale.

AttributeDetails
PublisherChainguard
Report PeriodData through December 2025
ScopeContainer images, language libraries, versions, build hygiene
SourceThe Hacker News
PublishedApril 2, 2026

Key Findings

1. Version Lag Is a Systemic Problem

A significant portion of observed container images and language library deployments are running out-of-date versions — often by months or years. Even within organizations with active security programs, version drift is common in:

  • Base container images (OS layers, runtime environments)
  • Indirect/transitive dependencies pulled in by language package managers
  • Language runtime versions (Python, Node.js, Go, Java) inside containers

Version lag means vulnerabilities disclosed against older versions remain present in production long after patches are available.

2. Rebuild and Provenance Hygiene Is Rare

The report found that most open source artifacts in production cannot be traced to a verified build process. Key gaps include:

PROVENANCE GAPS IDENTIFIED:
- Majority of consumed packages lack SLSA attestations
- Most container images are pulled from registries without
  verified build provenance
- Supply chain integrity controls (Sigstore, in-toto) present
  in less than a minority of observed environments
- SBOMs (Software Bills of Materials) are generated for some
  images but rarely consumed or acted upon downstream

Without provenance, organizations cannot verify that the artifact they downloaded matches what was built from the original source — creating an undetected window for supply chain tampering.

3. Widely Used Images Have Long Vulnerability Tails

For popular container base images (OS distros, language runtimes, web servers), the report documents a pattern where:

  • CVEs accumulate over time in images that are not regularly rebuilt
  • Images tagged latest or with major version tags (e.g., python:3) may silently trail current security patches
  • Organizations using pinned digests for reproducibility may be locking in vulnerable versions without realizing it

The data shows that regularly rebuilt, minimal images (such as distroless or Chainguard's own hardened images) dramatically reduce the CVE surface area compared to traditional distribution-based images.

4. Language Libraries Show Concentrated Risk

Across the surveyed language ecosystems (Python/pip, JavaScript/npm, Java/Maven, Go modules), the report identifies:

CONCENTRATION RISK:
- A small number of high-popularity packages account for a
  disproportionate share of transitive dependency pulls
- These "keystone" packages — if compromised — would affect
  the vast majority of observed environments
- Recent high-profile attacks (Axios npm breach, LiteLLM PyPI
  compromise) confirm active attacker interest in these packages
- Version pinning practices vary widely; many applications
  use loose version specifiers that allow automatic updates
  to potentially malicious releases

5. Patch Adoption Is Slow After Disclosure

For vulnerability disclosures affecting widely used packages, the report tracks patch adoption rates:

  • Median time to update a vulnerable dependency after a high-severity CVE disclosure: several weeks to months
  • Critical infrastructure and financial services organizations show faster patch adoption but still lag
  • Transitive dependencies (vulnerabilities in packages depended on by the direct dependency, not by the application itself) see even slower remediation

Recommendations from the Report

For Security Teams

  1. Adopt an SBOM-first approach — generate SBOMs for all production artifacts and consume them in your vulnerability management pipeline
  2. Implement continuous container image scanning — point-in-time scans at build time miss vulnerabilities disclosed after the image was built
  3. Use minimal, regularly rebuilt base images — prefer distroless or hardened base images that are rebuilt nightly against current package versions
  4. Apply version pinning with hash verification — pin to specific digests, not tags, and verify hash integrity in CI/CD pipelines

For Platform and DevOps Teams

PRACTICAL STEPS:
- Integrate Grype, Trivy, or Snyk into your CI/CD pipeline
  for automated vulnerability scanning on every build
- Enable Cosign signature verification for container pulls
  from registries that support it
- Use Dependabot or Renovate to automate dependency updates
  with configurable risk thresholds
- Require SLSA Level 2+ for critical internal packages
  and prefer SLSA-attested external packages

For Procurement and Vendor Risk

  • Require SBOMs from software vendors as part of procurement
  • Include supply chain security requirements in vendor contracts
  • Audit vendor container images and libraries against CVE databases before deployment

Context: The Supply Chain Security Imperative

The findings come at a time of heightened regulatory pressure on software supply chain security:

InitiativeStatus
US Executive Order 14028 (SBOM mandate)Enforced for federal vendors
EU Cyber Resilience ActTaking effect through 2027
NIST SSDF (Secure Software Development Framework)Referenced in federal procurement
CISA Known Exploited Vulnerabilities (KEV)Active — supply chain CVEs regularly added

The Chainguard report's findings align with the intent behind these frameworks: organizations need systematic, continuous visibility into their open source consumption, not periodic manual audits.


Bottom Line

The State of Trusted Open Source report delivers a data-backed reality check: most organizations are running open source they cannot fully account for, at versions they have not verified, from builds whose provenance they cannot trace. As supply chain attacks become more frequent and more sophisticated, the gap between assumed and actual software trustworthiness represents a material and growing risk.


Source: The Hacker News — April 2, 2026 · Chainguard State of Trusted Open Source Report

#Open Source Security#Supply Chain#Container Security#Chainguard#Software Security#SBOM#The Hacker News

Related Articles

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Anthropic confirmed that internal source code for its Claude Code AI coding assistant was accidentally published to npm due to a human packaging error. No sensitive customer data or credentials were exposed in the incident.

5 min read

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

The TeamPCP threat actor — behind previous supply chain attacks on Trivy, KICS, and litellm — has now compromised the telnyx Python package on PyPI,...

4 min read

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

The Trivy supply chain attack has expanded dramatically beyond GitHub Actions: malicious Docker Hub images (versions 0.69.4–0.69.6) carry an infostealer,...

7 min read
Back to all News