Risk Explorer
for Software Supply Chains
This page presents a taxonomy of known attacks and techniques to inject malicious code into open-source software projects.
A so-called attack tree is used to organize those techniques hierarchically, starting from the abstract, top-level goal down to alternative and more concrete attack techniques.
This information has been compiled on the basis of numerous real-world incidents, i.e. actual attacks and vulnerabilities, as well as plausible proof-of-concepts and scientific literature.
The page also documents safeguards to fully or partially mitigate the different attack techniques, thereby referencing existing standards and frameworks.
We found that existing works on open-source supply chain security lack a comprehensive, comprehensible, and general description of how attackers inject malicious code into open-source projects, linked to real-world incidents and independent of specific programming languages, ecosystems, technologies and stakeholders.
We believe a taxonomy classifying such attacks is of value for both academia and industry. Serving as a common reference and clarifying terminology, it could support several activities, e.g. awareness-raising, safeguard development, pentest scoping or threat modeling.
Explore the taxonomy with help of the visualization tool:
Single-click on a node to expand or collapse it, and to show associated information like its description, references, associated examples and related countermeasures.