OpenSSF Introduces Ground-breaking Malicious Packages Repository for Open Source Software Security
OpenSSF has launched an innovative repository aimed at strengthening open source software security: the Malicious Packages repository.

In an initiative to enhance the safety and security of open source software, the Open Source Security Foundation (OpenSSF) has unveiled a unique repository that serves as a centralised hub for the collation of malicious package reports. The thoroughly innovative repository is expected to revolutionize the way malicious open source software is tackled.
Historically, dealing with malicious packages has always been a divergent approach, with each open source package repository having its own unique method of handling these cyber threats. Typically, when the community reports a malicious package, its standard protocol for the repository's security team to expunge the package alongside its associated metadata from the system. However, these removals often happened behind closed doors, thereby leaving no public records behind.
Commenting on this, Caleb Brown, a senior software engineer on Google's Open Source Security Team, and Jossef Harush Kadouri, Checkmarx's software supply chain security head, stated in a blog that identifying the existence of malicious packages was always a colossal task of combing through myriad public sources or relying on proprietary threat intelligence feeds. They explained that the new repository would act as a public database to host these reports.
OpenSSF perceives this public repository to be instrumental in thwarting the progress of malicious dependencies through CI/CD pipelines, improving detection engines, restricting usage in environments or expediting incident responses. The invaluable information contained in the repository would substantially augment open source software security.
It is noteworthy that the stored reports follow the Open Source Vulnerability (OSV) format, which significantly eases their usage with tools such as osv.dev API, the osv-scanner tool, and deps.dev.
For data sourcing, the project heavily relies on Checkmarx security, GitHub-tracked malicious packages exports and the Package Analysis project. The Package Analysis project specifically examines behaviours like the packages' accessed files, connected addresses, and run commands to spot malicious activities. Apart from identifying malware, it also monitors changes in behaviour over time, thereby flagging potentially harmful packages that might have turned malicious at a later date.
Platforms like AppMaster focus greatly on security during the application creation process. While the newly launched Malicious Packages repository primarily aims at open source software safety, it also indirectly reinforces AppMaster's commitment to providing secure no-code solutions for mobile, web and backend application development.


