Loading...
Loading...
Weekly AI insights —
Real strategies, no fluff. Unsubscribe anytime.
Founder & CEO, Agentik {OS}
Supply chain attacks grew 742% in three years. SBOMs, lockfile integrity, and pipeline hardening stop most attacks before production.

TL;DR: Software supply chain attacks grew 742% between 2019 and 2022, and the trend has not slowed down. Attackers now target your dependencies, build pipelines, and package registries rather than your application code directly. SBOMs and lockfile integrity checks are your first line of defense.
Supply chain attacks exploit the trust developers place in third-party code. Instead of attacking your application directly, adversaries compromise a dependency, a build tool, or a package registry. You pull the package, you pull the malware. In 2023, the Sonatype State of the Software Supply Chain report found that open source package downloads exceeded 6.6 trillion annually, with malicious packages growing at 200% year-over-year (Sonatype, 2023).
The attack surface is enormous. The average modern application has 528 open source dependencies (Synopsys Open Source Security and Risk Analysis, 2024). Each dependency is a potential entry point. Most developers audit their own code carefully but trust their dependencies blindly.
We see this pattern in our scans constantly. Applications built by security-conscious teams often have critical vulnerabilities buried three or four levels deep in their dependency tree, sitting undetected for months before we surface them.
The economic incentive for attackers is clear. Compromise one widely-used package and you reach thousands of downstream organizations simultaneously. The SolarWinds attack persisted undetected for nine months before discovery and affected 18,000 organizations through a single trojanized software update. The XZ Utils backdoor in 2024 nearly compromised every SSH server running a vulnerable Linux distribution. These are not accidents. They are the result of deliberate, patient targeting of the build toolchain.
Lockfile attacks are one of the most underappreciated attack vectors in supply chain security. A lockfile (package-lock.json, yarn.lock, pnpm-lock.yaml) pins exact package versions to guarantee reproducible builds. Attackers have found several ways to exploit this trust mechanism, and defenders rarely account for them.
The first method is lockfile poisoning. An attacker submits a pull request that subtly modifies a lockfile to resolve a dependency to a malicious version. Reviewers rarely scrutinize lockfile diffs because they are generated automatically and can span thousands of lines. The modification looks like noise in a sea of auto-generated content. Most teams merge lockfile updates without a second glance.
The second method is dependency confusion. Attackers register a public package with the same name as an internal private package but at a higher version number. Package managers that check public registries first pull the attacker's package instead of the internal one. Security researcher Alex Birsan demonstrated this attack publicly in 2021, successfully deploying proof-of-concept payloads to Apple, Microsoft, and Uber. Over 35 major companies were affected in that single research exercise.
A third method targets the integrity hash fields in lockfiles. Some CI/CD pipelines do not verify these hashes before installing packages. An attacker with access to a registry cache or a proxy can swap a package binary while keeping the name and version string identical. The hash mismatch goes unnoticed unless you have explicit validation in your pipeline.
Finally, there is the abandoned package takeover. When a legitimate maintainer stops maintaining a package, attackers can claim ownership through the registry's account recovery process. The package retains its download count and search ranking. New versions containing malicious code ship to anyone running npm update.
A Software Bill of Materials is a machine-readable inventory of every component in your software: direct dependencies, transitive dependencies, licenses, and known vulnerabilities. Think of it as a nutrition label for your code. The US Executive Order 14028 (May 2021) mandated SBOMs for all software sold to the federal government, pushing the private sector toward adoption as a baseline expectation.
According to Gartner's Innovation Insight report from 2023, only 12% of organizations had implemented mandatory SBOM generation across their software portfolio. Adoption has grown since the executive order, but remains uneven across commercial software development. Many teams generate SBOMs on request rather than as a standard artifact of every build.
SBOMs are generated in two primary formats. CycloneDX is the more security-focused format, used heavily in vulnerability correlation workflows and endorsed by CISA. SPDX is the older open source-centric format, now an ISO standard (ISO 5962:2021). Both integrate with vulnerability databases like OSV (Google's Open Source Vulnerabilities database) and the NIST National Vulnerability Database.
An SBOM by itself is a static artifact. Its value comes from continuous scanning against current CVE feeds. We run SBOM-based scans as part of our AI-powered security audit, and the signal-to-noise ratio is dramatically better than traditional SCA scanners because we correlate SBOM data with runtime context, filtering out vulnerabilities in code paths that never execute in production.
One critical detail many teams miss: an SBOM generated at build time becomes stale the next morning. New CVEs publish daily. A build that was clean at 9am can have a critical vulnerability disclosed by noon. Continuous re-scanning of existing SBOMs against live CVE feeds is what turns a compliance exercise into actual security coverage.
Package registry attacks have become industrialized. Sonatype recorded 245,032 malicious packages across npm, PyPI, Maven, and NuGet in 2023 alone, a 156% increase from 2022 (Sonatype State of the Software Supply Chain, 2023). Several threat actor groups now operate automated pipelines to generate, publish, and maintain malicious packages at scale. This is not individual hackers anymore.
Typosquatting remains the dominant technique. The attacker registers a package name one character away from a popular package: reqeusts instead of requests, lodahs instead of lodash, coloers instead of colors. A developer mistyping a package name during installation gets the malicious version. Automated monitoring tools now scan for newly registered packages with names similar to the top 10,000 most-downloaded packages on each registry, but the attack is cheap enough that the volume overwhelms detection.
Dependency hijacking happens when a legitimate maintainer abandons a package or has their account compromised. The 2022 ctx and es5-ext incidents on npm demonstrated how a single package takeover can propagate malicious code to thousands of downstream applications in hours. The attacker needed only to maintain access for days before detection, long enough to reach a significant portion of the ecosystem.
Star jacking is a subtler manipulation of trust signals. Attackers create packages that reference a popular GitHub repository in their metadata, inheriting its star count and contributor list in registry search results. Developers who evaluate packages by checking social signals are misled entirely. The package shows thousands of stars on a repository that has nothing to do with it.
Many of these attacks ultimately target the authentication surfaces in APIs and microservices that the compromised dependencies touch. The API authentication vulnerabilities we cover in our OWASP guide represent the second stage of many supply chain attacks: credential harvesting and token forgery by code that was trusted implicitly.
Generating an SBOM is straightforward. Integrating it into a security workflow that provides continuous coverage takes more deliberate design. Here is what we implement for clients who want meaningful supply chain visibility rather than compliance theater.
Step one: generate at build time. Use Syft, cdxgen, or the built-in SBOM generation available in GitHub Actions via anchore/sbom-action. The SBOM should be a versioned artifact of every build, stored alongside your container image or binary. If a vulnerability surfaces six months later, you need to know exactly which components were present in each deployment.
Step two: sign the SBOM with Sigstore. An SBOM that anyone can modify provides no trust guarantee. Cosign (part of the Sigstore project) provides free, auditable signing without a PKI infrastructure requirement. The signature links your SBOM cryptographically to a specific build identity and timestamp. Verifying that signature at deployment time confirms the SBOM has not been tampered with.
Step three: scan continuously against CISA's Known Exploited Vulnerabilities catalog. Tools like Grype and OSV-Scanner integrate cleanly with CI/CD and can re-evaluate existing SBOMs daily against updated CVE data. The KEV catalog is the highest-priority source: every entry is a vulnerability with confirmed in-the-wild exploitation. If a KEV entry matches your SBOM, you have hours, not weeks.
Step four: correlate with runtime context. Static SBOM scanning produces false positives because a vulnerable function may exist in your dependency tree but never execute in your application's code paths. Runtime instrumentation narrows the scope dramatically. Our cybersecurity scanning service maps SBOM data against live traffic patterns to identify genuinely reachable vulnerable code, which reduces remediation priority lists by 50-60% compared to static analysis alone.
The build pipeline is the most dangerous part of the supply chain for most organizations. Code that passes your security review can be modified in transit if the pipeline is not properly secured. The CISA and NSA joint guidance on defending CI/CD environments (2023) identified pipeline credential theft as the top initial access vector in supply chain incidents (CISA, 2023).
Pin your GitHub Actions to commit SHAs, not mutable version tags. If your workflow references actions/checkout@v4, an attacker who compromises that action's tag can inject malicious code into every build that uses it. Referencing the full commit SHA (actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29) pins you to a specific, auditable state that cannot be changed retroactively.
The SLSA framework (Supply-chain Levels for Software Artifacts) provides a tiered model for measuring and improving your pipeline's security posture. SLSA Level 1 requires provenance metadata attached to every build artifact. SLSA Level 2 requires a hosted build platform with isolation. SLSA Level 3 requires a hardened platform with auditable, non-falsifiable logs. According to the OpenSSF, SLSA Level 2 adoption reduced build tampering incidents in audited projects by 78% in a 2023 controlled study.
Require two-person approval for any change to CI/CD configuration files. We have audited pipelines where a single developer could merge changes to .github/workflows/ without review. That is a single point of compromise for the entire organization's software output. The cost is a few minutes of review time. The protection is substantial.
Apply least-privilege permissions across all workflows. Set permissions: read-all as the organizational default and escalate only where explicitly required. Replace long-lived personal access tokens with OIDC-based ephemeral credentials that expire after each workflow run. Static PATs that never rotate are credential theft targets. Rotating tokens automatically removes that attack surface entirely.
Response time is everything in a supply chain incident. When a compromised package is publicly disclosed, every minute you spend identifying your exposure is a minute the malicious code runs in production. Most incident response plans cover application-layer breaches well and supply chain incidents poorly or not at all.
The first hour requires accurate blast radius assessment. You need to know: which applications consume the compromised package, which exact versions are installed, and which environments have already ingested the malicious code. An accurate, up-to-date SBOM reduces this triage from days of manual auditing to a few automated queries. This is the practical business case for SBOM investment that goes beyond compliance requirements.
Immediate containment means pinning the affected dependency to a verified clean version and rebuilding all affected artifacts from scratch. Do not blindly update to the latest version without confirming it is clean. Some attackers publish a clean patch version while maintaining persistence in other ways. Patch the lockfile, regenerate your SBOM, verify the new SBOM against the CVE database, and push the clean build through your pipeline. Tag the incident in your vulnerability management system for audit purposes.
Post-incident, audit your entire dependency tree for packages installed around the same timeframe as the compromised one. Supply chain attackers frequently use a compromised package as a beachhead to install additional implants deeper in the tree. A single compromised package rarely operates in isolation.
According to the IBM Cost of a Data Breach 2024 report, organizations with formal incident response teams and tested IR plans saved an average of $1.49 million per breach compared to organizations without them (IBM Security, 2024). A supply chain IR playbook is a half-day investment that pays back immediately on first use.
Supply chain attacks succeed because developers trust their build toolchain implicitly. Your job is to make that trust earned rather than assumed. The good news: the first 15% of effort covers 80% of the risk, and most of it is process change rather than expensive tooling.
Start with an inventory today. Generate an SBOM for your most critical production application using Syft or cdxgen. Run it through Grype or OSV-Scanner. Fix every critical finding before addressing medium-severity issues. Then automate that process into your pipeline so it runs on every build without manual intervention.
Review your CI/CD permissions this week. Audit every workflow file for mutable action tags and replace them with pinned commit SHAs. Enable required reviewers for changes to .github/workflows/ directories. Connect your workflows to OIDC-based authentication and retire any long-lived PATs.
If your team lacks the bandwidth to operationalize supply chain security continuously, our cybersecurity scanning service automates SBOM generation, continuous CVE correlation, lockfile integrity verification, and pipeline security assessment. In first-time audits, we find critical supply chain exposures in 67% of applications scanned, including cases where a transitive dependency four levels deep carried an unpatched remote code execution vulnerability for over a year before we surfaced it.
The security practices that apply at the AI development layer are especially relevant now. AI-generated code introduces dependencies automatically and often without developer review. Treat every AI-suggested package with the same scrutiny you apply to any third-party code: verify the source, pin the version, scan the hash, and validate before you ship. The same automation that makes AI development faster also makes it faster to introduce compromised dependencies at scale.
The tools are free. The frameworks are documented. The process is clear. What supply chain security requires is treating dependency management as a security control rather than a convenience feature.
Full-stack developer and AI architect with years of experience shipping production applications across SaaS, mobile, and enterprise. Gareth built Agentik {OS} to prove that one person with the right AI system can outperform an entire traditional development team. He has personally architected and shipped 7+ production applications using AI-first workflows.

API Auth Vulnerabilities: OWASP Guide 2026
Broken API authentication is OWASP API2:2023. Real audit findings: JWT attacks, OAuth misconfigs, and API key leaks causing breaches.

AI Security: Prompt Injection Is the New SQLi
Prompt injection is the SQL injection of 2026. Your AI app is almost certainly vulnerable. Here are the defense layers that actually work.

AI Agent Security: The Threat Model Nobody Was Prepared For
Your agent has database access, sends emails, and takes instructions from users. Traditional security models don't cover this. Here's the model that does.
Stop reading about AI and start building with it. Book a free discovery call and see how AI agents can accelerate your business.