
Data Security Decoded The Hidden Risk in Your Stack
Dec 16, 2025
In this discussion, Hayden Smith, CEO of Hunted Labs and expert in software supply chain security, reveals the hidden risks inherent in open source dependencies. He explains how modern attackers infiltrate ecosystems through fake accounts and counterfeit contributions. Hayden highlights the importance of proactive threat hunting using AI for uncovering vulnerabilities, and stresses recovery strategies like dependency pinning. Listeners gain valuable insights on safeguarding their software environments while navigating the complexities of today’s cyber threats.
AI Snips
Chapters
Transcript
Episode notes
Open Source Is Ubiquitous And Risky
- Open source underpins most modern software, often composing 70–80% of enterprise apps.
- That reliance speeds development but creates systemic exposure when upstream practices differ from enterprise standards.
Contributing Code As The Primary Attack Vector
- Attackers often gain access by contributing code and building trust with maintainers.
- Hayden describes attacks where fake contributor accounts and malicious packages leveraged that trust as an entry point.
The Indonesian Fake-Package Campaign
- The Indonesian 'fake package' campaign published thousands of malicious NPM packages to pollute the ecosystem.
- Hayden recounts packages being published every seven seconds and sourcing additional fake dependencies inside package.json.

