
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Security News
Sarah Gooding
February 28, 2025
The Open Source Security Foundation (OpenSSF) announced the initial release of the Open Source Project Security Baseline (OSPS Baseline) this week. This is a new tiered framework designed to help open source projects implement appropriate security measures without drowning in complexity.
Think of the OSPS Baseline as the security equivalent of a home security checklist – but for code. It's a straightforward list of security practices organized into different levels based on project maturity. Baseline answers the question: "What are the minimum security steps I need to take so my project doesn't become tomorrow's cautionary tale?"
The baseline provides:
The OSPS Baseline provides a tiered approach to security, with each level building upon the previous one:
The Level 1 baseline includes a set of fundamental security requirements that all open source projects should aim to implement:
Access Control
Build and Release
Documentation
Governance
Legal
Quality
Vulnerability Management
Acknowledging the interconnectedness of the open source software supply chain, OpenSSF is recommending that all projects meet Baseline level 1 as a minimum:
All projects are encouraged to adhere to Baseline level 1 at minimum because it establishes a “universal security floor” for all open source, capturing many modern-day expectations for software development in an internationally connected ecosystem amidst modern-day online threats (refer to CNCF’s software supply chain compromise catalog for examples of successful attacks). If you are a foundation that has some level or maturity criteria, we recommend you evaluate your lowest criteria tier for security and adjust to match (where reasonable and appropriate) the level 1 baseline.
Stacey Potter, Independent Open Source Community Manager who helped lead the OSPS Baseline pilot efforts, noted: "We know it can be tough to navigate all the security standards out there, so we built a framework that grows with your project."
The introduction of new Baseline requirements may be confusing to those who are already familiar with OpenSSF’s existing Scorecard and the Best Practices Badge initiatives. The new OSPS Baseline initiative attempts to bridge some gaps:
Several projects have already committed to adoption during the pilot phase, including GUAC, OpenVEX, bomctl, and Open Telemetry. Projects can self-attest their compliance with the baseline, with the compliance status being point-in-time.
Ben Cotton, Open Source Community Lead at Kusari & OSPS Baseline co-maintainer, stated: "This effort provides actionable, practical guidance to help developers achieve appropriate security levels for their projects. Too often, security advice is vague or impractical, but Baseline aims to change that."
It is important to note that adoption of the OSPS Baseline is voluntary for open source projects, unless specifically required by a sponsoring organization. The baseline is not intended to be used as a security comparison tool between projects or as a scoring mechanism.
The Level 1 requirements, while designed to establish a "universal security floor," may present implementation challenges for solo maintainers with limited time and resources. This demographic represents the vast majority of open source projects. Multi-factor authentication requirements, branch protection mechanisms, and comprehensive documentation expectations all demand additional effort beyond core development work.
Solo maintainers often operate with significant constraints—many maintain projects as side endeavors alongside full-time employment or other responsibilities. The baseline requirements at Level 1, while security-enhancing, represent administrative overhead that could detract from feature development or bug fixes.
The formalization of security practices through this baseline creates a potential stratification in the open source ecosystem. Projects with organizational backing or multiple contributors can more easily distribute compliance work, while solo maintainers may struggle to meet all requirements. The voluntary nature of the baseline is key here - solo maintainers can implement these practices incrementally as their projects grow in importance and adoption, rather than feeling pressured to comply with all requirements immediately.
For the broader ecosystem, this initiative represents a continuation of the trend toward greater professionalization of open source development. If OSPS gains adoption it could set a new standard for security practices across projects of all sizes, contributing to a more resilient software supply chain.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.