You secured your code dependencies, is that enough?

Bsides Kerala 2025

08 February 2025

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation at Bsides Kerala challenges the common assumption that securing code dependencies is sufficient for software supply chain security. Anant Shrivastava systematically demonstrates that the software supply chain extends far beyond package managers and SBoMs, encompassing browser extensions, IDE plugins, CI/CD systems, container images, dependency caching servers, and even software sold and re-purposed by malicious actors. Through real-world case studies and attack references, the talk maps out overlooked attack vectors and proposes the ATOM framework for building a comprehensive supply chain security posture.

Key Topics Covered

Supply Chain Security Background:

SBoM and SCA — Necessary but Insufficient:

Supply Chains Beyond Code Dependencies:

Developer Machines as High-Value Targets:

Real-World Attack Case Studies:

The ATOM Framework — A Plan for Action:

Actionable Takeaways

  1. Expand your supply chain security scope beyond code dependencies to include browser extensions, IDE plugins, CI/CD pipelines, container images, and package manager scripts.
  2. Treat developer machines as high-value targets — they hold credentials, have relaxed security policies, and run powerful applications that expand the attack surface.
  3. Never blindly trust curl-pipe-to-shell installations; verify scripts independently since servers can serve different content to curl versus browsers.
  4. Audit browser extensions across your organization — use enterprise policies to whitelist approved extensions and monitor for unauthorized installs.
  5. Review VS Code and IDE marketplace extensions for known malicious packages, and establish an approval process for new extension installations.
  6. Secure CI/CD systems as critical infrastructure — follow NSA/CISA guidance for defending build and deployment environments, and monitor for unauthorized changes to pipeline configurations.
  7. Verify container images before deployment — scan for vulnerabilities, validate provenance, and avoid pulling untrusted images from public registries.
  8. Apply the ATOM framework: build Awareness of your full supply chain, Trust But Verify all components, implement Ongoing Monitoring for changes, and Measure & Map your actual exposure to answer real security questions.