Articles | Open Access |

Understanding and Securing Software Dependency Ecosystems: Risk Assessment, Malicious Packages, and SBOM Strategies

Ashwin R. Menon , University of Edinburgh, United Kingdom

Abstract

Software supply chain security has emerged as a critical domain within cybersecurity research and enterprise practices due to the increasing complexity of interconnected software ecosystems and the proliferation of dependency networks. This research article provides an in-depth theoretical and empirical synthesis of supply chain risk vectors, with an emphasis on third‑party component vulnerabilities, dependency freshness, automated malicious package detection, and holistic risk management frameworks. Drawing on prolific work in software supply chain risk assessment (Croll et al.), open source trust paradoxes (Silic & Back), and empirical analyses of ecosystem vulnerabilities (Delamore & Ko; Decan et al.), this research scrutinizes both systemic and component‑level risk dynamics that threaten software integrity. We explore supply chain risk management foundations, interrogate real‑world attack case studies such as malicious npm packages and backdoored Docker images, and articulate the role of software bill of materials (SBOM) in supply chain transparency. Furthermore, we revisit dependency freshness and outdated workflows as persistent challenges in ecosystem hygiene, integrating perspectives on vulnerability datasets and advanced detection techniques. Our contribution contextualizes existing research within a unified narrative that elucidates theoretical underpinnings, identifies persistent gaps, and proposes an integrated, resilient software supply chain security model, emphasizing rigorous monitoring, automated detection, governance frameworks, and future research trajectories.

Keywords

Software Supply Chain Security, Dependencies, Vulnerability Management, SBOM

References

B. Delamore and R. K. L. Ko, “A global, empirical analysis of the shellshock vulnerability in web applications,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 1129–1135, 2015.

S. Du, T. Lu, L. Zhao, B. Xu, X. Guo, and H. Yang, “Towards an analysis of software supply chain risk management,” in Proceedings of the World Congress on Engineering and Computer Science, vol. 1, 2013.

M. Silic and A. Back, “Information security and open source dual use security software: trust paradox,” in IFIP International Conference on Open Source Systems, pp. 194–206, Springer, 2013.

C. W. Axelrod, “Assuring software and hardware security and integrity throughout the supply chain,” in 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 62–68, 2011.

C. J. Alberts, A. J. Dorofee, R. Creel, R. J. Ellison, and C. Woody, “A systemic approach for assessing software supply‑chain risk,” in 2011 44th Hawaii International Conference on System Sciences, pp. 1–8, 2011.

P. R. Croll, “Supply chain risk management - understanding vulnerabilities in code you buy, build, or integrate,” in 2011 IEEE International Systems Conference, pp. 194–200, 2011.

R. J. Ellison and C. Woody, “Supply‑chain risk management: Incorporating security into software development,” in 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10, 2010.

G. Ferreira, L. Jia, J. Sunshine, and C. Kastner, “Containing malicious package updates in npm with a lightweight permission system,” in 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1334–1346, 2021.

Sejfia and M. Schafer, “Practical automated detection of malicious npm packages,” arXiv preprint arXiv:2202.13953, 2022.

M. Balliauw, “Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!,” 2021.

L. Constantin, “Npm Attackers Sneak a Backdoor into Node.js Deployments through Dependencies,” 2018.

C. Cimpanu, “17 Backdoored Docker Images Removed From Docker Hub,” 2018.

“Plot to steal cryptocurrency foiled by the npm security team,” 2019.

Sharma, “Inside the ”fallguys” malware that steals your browsing data and gaming ims; continued attack on open source software.”

E. Roth, “Open source developer corrupts widely‑used libraries, affecting tons of projects.” Retrieved from https://www.theverge.com/2022/1/9/22874949/developer‑corrupts‑open‑so urce‑libraries‑projects‑affected.

Shukla, O. Software Supply Chain Security: Designing a Secure Solution with SBOM for Modern Software EcoSystems.

CNCF. Cloud Native Computing Foundation (CNCF). Retrieved from https://www.cncf.io/.

Serena Cofano, Giacomo Benedetti, and Matteo Dell’Amico. SBOM generation tools in the Python ecosystem: An in‑detail analysis. arXiv:2409.01214.

Joel Cox, Eric Bouwers, Marko van Eekelen, and Joost Visser. Measuring dependency freshness in software systems. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 2, 109–118.

Roland Croft, M. Ali Babar, and M. Mehdi Kholoosi. Data quality for software vulnerability datasets. In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 121–133.

DataDog. GuardDog. Retrieved from https://github.com/datadog/guarddog.

Alexandre Decan, Tom Mens, and Eleni Constantinou. On the evolution of technical lag in the npm package dependency network. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), 404–414.

Alexandre Decan, Tom Mens, and Eleni Constantinou. On the impact of security vulnerabilities in the npm package dependency network. In 15th International Conference on Mining Software Repositories, 181–191.

Alexandre Decan, Tom Mens, and Hassan Onsori Delicheh. On the outdatedness of workflows in the GitHub Actions ecosystem. Journal of Systems and Software 206, 111827.

Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. Keep me updated: An empirical study of third‑party library updatability on Android. In 2017 ACM SIGSAC Conference on Computer and Communications Security.

Jens Dietrich, David Pearce, Jacob Stringer, Amjed Tahir, and Kelly Blincoe. Dependency versioning in the wild. In 2019 IEEE/ACM 16th International Conference on Mining Software Repositories.

Xueying Du, Geng Zheng, Kaixin Wang, Jiayi Feng, Wentai Deng, Mingwei Liu, Bihuan Chen, Xin Peng, Tao Ma, and Yiling Lou. Vul‑RAG: Enhancing LLM‑based vulnerability detection via knowledge‑level rag. arXiv:2406.11147.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Understanding and Securing Software Dependency Ecosystems: Risk Assessment, Malicious Packages, and SBOM Strategies. (2025). International Journal of Modern Medicine, 4(10), 21-28. https://intjmm.com/index.php/ijmm/article/view/82