Data Security Decoded

The Hidden Risk in Your Stack

Dec 16, 2025
In this discussion, Hayden Smith, CEO of Hunted Labs and expert in software supply chain security, reveals the hidden risks inherent in open source dependencies. He explains how modern attackers infiltrate ecosystems through fake accounts and counterfeit contributions. Hayden highlights the importance of proactive threat hunting using AI for uncovering vulnerabilities, and stresses recovery strategies like dependency pinning. Listeners gain valuable insights on safeguarding their software environments while navigating the complexities of today’s cyber threats.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Open Source Is Ubiquitous And Risky

  • Open source underpins most modern software, often composing 70–80% of enterprise apps.
  • That reliance speeds development but creates systemic exposure when upstream practices differ from enterprise standards.
ANECDOTE

Contributing Code As The Primary Attack Vector

  • Attackers often gain access by contributing code and building trust with maintainers.
  • Hayden describes attacks where fake contributor accounts and malicious packages leveraged that trust as an entry point.
ANECDOTE

The Indonesian Fake-Package Campaign

  • The Indonesian 'fake package' campaign published thousands of malicious NPM packages to pollute the ecosystem.
  • Hayden recounts packages being published every seven seconds and sourcing additional fake dependencies inside package.json.
Get the Snipd Podcast app to discover more snips from this episode
Get the app