After the XZ Utils backdoor discovery in 2024—where a compromised compression utility could have granted attackers full administrative control over millions of systems—your compliance team probably added "open source risk" to the agenda. However, the conversation that followed likely reinforced misconceptions that worsen your actual risk.
These myths persist because they're comforting. They let you believe that open source security is someone else's problem or that your current vendor questionnaire covers it. None of this is true.
Here's what you need to know.
Myth 1: "Popular Projects Are Secure Projects"
Reality: Popularity correlates with visibility, not security.
XZ Utils was widely deployed across Linux distributions and server infrastructure. That ubiquity didn't prevent a single attacker—operating under the identity "Jia Tan"—from inserting a backdoor that evaded detection for months. The project's reach actually made it a more attractive target.
When you evaluate open source dependencies, count the number of active maintainers with merge rights, not the download statistics. A project with 10 million weekly downloads but one burned-out maintainer is a supply chain incident waiting to happen. Check the commit history and the bus factor: how many people need to disappear before the project becomes unmaintained?
For your ISO 27001 compliance work, this maps to Control 5.19 (Information security in supplier relationships) and Control 8.30 (Outsourced development). Your supplier risk assessment can't stop at "this library is popular." You need to document maintainer count, governance structure, and succession planning—or accept that you're running unquantified risk.
Myth 2: "Maintainer Burnout Is a Soft Issue, Not a Security Issue"
Reality: Exhausted maintainers make exploitable mistakes and become social engineering targets.
The XZ Utils attacker didn't exploit a technical vulnerability first. They exploited a human one: a solo maintainer overwhelmed by the project's scope, community demands, and lack of support. When you're drowning in unpaid labor, a helpful contributor who takes work off your plate looks like a lifeline, not a threat.
Burnout degrades code review quality. It makes maintainers rush security patches. It creates the conditions where handing commit access to a pseudonymous volunteer seems reasonable instead of catastrophic.
Your threat model must include maintainer state. When you conduct supply chain risk assessments under NIST CSF PR.PS-1 (baseline configurations for systems), add a column: "How many maintainers? Are they employed to work on this? When was the last governance change?" If you can't answer these questions, you're flying blind.
The Commonhaus Foundation's growth from 14 to 25 projects in 2025 reflects a recognition that governance and financial support aren't optional—they're security controls. Organizations that provide maintainers with funding, legal support, and administrative help reduce the social engineering surface area.
Myth 3: "Our SCA Tools Catch Supply Chain Attacks"
Reality: Software Composition Analysis tools find known vulnerabilities, not novel backdoors or compromised maintainers.
Your SCA scanner would have missed the XZ Utils backdoor until someone else discovered it and published a CVE. These tools compare your dependencies against databases of disclosed vulnerabilities. They don't detect:
- Maintainer account compromises
- Malicious commits from trusted contributors
- Backdoors disguised as legitimate features
- Subtle logic changes that enable future exploitation
For PCI DSS v4.0.1 Requirement 6.3.2 (inventory of bespoke and custom software and third-party software components), your SCA output satisfies the inventory requirement but not the security assessment requirement. You need additional controls: commit signature verification, reproducible builds, and monitoring of maintainer changes in critical dependencies.
Consider adding a policy: any dependency with fewer than three active maintainers requires quarterly manual review of recent commits. Yes, this is manual. Yes, it scales poorly. That's the point—it forces you to reduce your dependency count to what you can actually audit.
Myth 4: "Open Source Means Many Eyes Are Reviewing the Code"
Reality: Most projects have zero regular code reviewers outside the maintainer.
The "many eyes" theory assumes that popularity equals scrutiny. It doesn't. Most users install the library, verify it works, and never look at the source. Even security-conscious developers rarely review dependency code unless they're investigating a specific bug.
The XZ Utils backdoor existed because one person controlled the review process. There were no "many eyes"—there was one exhausted maintainer and one attacker pretending to help.
When you're implementing NIST 800-53 Rev 5 SA-10 (Developer Configuration Management), don't assume upstream open source projects have equivalent controls. Your configuration management plan should specify: "For critical dependencies (authentication, cryptography, network protocols), we verify that the project requires two-person commit approval and publishes signed releases."
If a dependency doesn't meet that bar, you have three options: contribute resources to improve their governance, fork and maintain it yourself, or replace it. Continuing to use it while assuming someone else is doing the security work is not a fourth option.
Myth 5: "We Can't Influence Open Source Project Governance"
Reality: Your organization can—and should—support the projects you depend on.
You're already paying for open source. You're paying in incident response time when vulnerabilities appear. You're paying in compliance audit costs when you can't answer questions about supplier security. You're paying in engineering hours when projects go unmaintained and you need to fork or migrate.
The question isn't whether to invest in open source sustainability. It's whether you invest proactively (funding, governance support, maintainer time) or reactively (incident costs, emergency patches, supply chain failures).
For SOC 2 Type II CC9.1 (vendor management), your controls should include a budget line for open source support. This isn't charity—it's supply chain risk management. When you identify a critical dependency with governance gaps, you can:
- Fund maintainer time through foundations like Commonhaus
- Assign an engineer to contribute reviews and maintenance
- Sponsor security audits
- Provide legal or administrative support
Document these investments in your vendor management program. They're as legitimate as your payments to commercial software vendors—more legitimate, actually, since you're addressing root causes instead of just buying insurance.
What to Do Instead
Stop treating open source as free-as-in-someone-else's-problem. Build a dependency governance program:
Immediate actions:
- Inventory your dependencies and count active maintainers for each
- Flag any project with fewer than two people with merge rights
- Add "maintainer governance" to your supplier risk assessment template
- Budget for open source support in your next planning cycle
Quarterly review:
- Monitor maintainer changes in critical dependencies
- Review commit patterns for projects with single maintainers
- Assess whether projects you depend on have published governance models
Annual program:
- Allocate engineering time for upstream contributions to critical dependencies
- Fund maintainer support through established foundations
- Require reproducible builds and commit signing for high-risk dependencies
The XZ Utils incident wasn't an anomaly—it was a preview. Your supply chain includes dozens of solo maintainers holding together critical infrastructure on volunteer time. You can keep pretending that's sustainable, or you can treat maintainer support as the security control it actually is.



