Back to Blog
DevOps & Platform Eng

Open Source Won the Infrastructure War — Governance and Security Are the New Battle

Open source governance is the new battleground. Vulnerabilities doubled to 581 per codebase. 68% have license conflicts. 95% of vulnerabilities in transitive dependencies. 85% use AI assistants. 17% of components bypass package managers. EU CRA imposes legal liability. Maintainer burnout threatens critical projects.

DevOps & Platform Eng
Thought Leadership
10 min read
27 views

Open source governance has become the defining challenge for engineering organizations as 97% use open source AI models in development yet far fewer have the visibility to track them. The mean number of open source vulnerabilities per codebase has more than doubled, rising 107% to an average of 581 vulnerabilities according to the 2026 OSSRA report. Furthermore, open source components make up 60-80% of modern application codebases. However, 95% of vulnerabilities exist not in code organizations write but in transitive dependencies pulled in without scrutiny. Meanwhile, 68% of audited codebases contained license conflicts, up from 56% the previous year. Critical open source infrastructure still depends on under-resourced volunteer maintainers. The EU Cyber Resilience Act makes organizations legally responsible for open source security in their products. In this guide, we break down why open source governance and security are the new battleground after open source won the infrastructure war.

581
Mean Vulnerabilities Per Codebase (107% Increase)
68%
of Codebases Contain Open Source License Conflicts
95%
of OSS Vulnerabilities Live in Transitive Dependencies

Why Open Source Governance Is the New Battleground

Open source governance is the new battleground because open source won the infrastructure war so completely that every application now depends on components that organizations do not control. The supply-side value of the most widely used open source is estimated at $4.15 billion. However, the demand-side value reaches a staggering $8.8 trillion. This represents the cost companies would face to develop equivalent software internally. Consequently, the entire digital economy rests on open source foundations that require governance attention matching their business criticality.

Furthermore, AI-powered coding assistants accelerate the problem. 85% of organizations use AI-powered coding assistants. 76% of companies that explicitly prohibit these tools acknowledge developers use them anyway. The mean number of files per codebase grew 74% year-over-year. Therefore, AI generates code faster than governance processes can evaluate it, creating security and licensing debt that compounds with every commit.

In addition, 17% of open source components enter codebases outside standard package managers through copy-pasted snippets, vendor inclusions, or AI generation. These components are invisible to traditional scanning tools. As a result, organizations have less visibility into their actual dependency landscape than they assume, making governance decisions based on incomplete information that misses the most dangerous blind spots.

The Maintainer Crisis

Critical open source infrastructure depends on under-resourced volunteer maintainers. Many work without compensation alongside regular employment. This leads to burnout creating vulnerabilities that adversaries exploit. When a vulnerability is discovered in a project untouched for years, there is often no maintainer to fix it. Organizations face difficult choices: fork the project, refactor the application, or accept the risk. The ecosystem needs better ways to identify critical but fragile projects and route funding to maintainers before abandonment creates security crises.

The Open Source Governance Threat Landscape in 2026

The open source governance threat landscape has expanded as AI-driven development, supply chain attacks, and regulatory pressure converge to create risks that traditional security approaches cannot address alone. Furthermore, the OpenSSF is trying to help developers adopt AI more securely while equipping maintainers to manage the growing influx of vulnerability reports. Specifically, frontier AI tools can uncover hundreds of vulnerabilities across popular open source projects in minutes, dramatically increasing findings landing on maintainers who are already overwhelmed. Therefore, the intersection of AI-driven vulnerability discovery and under-resourced maintainers creates a governance crisis requiring organizational investment rather than community goodwill alone.

Vulnerability Explosion
Mean vulnerabilities per codebase doubled to 581. Average open source components increased 30% year-over-year. Consequently, the volume of findings overwhelms manual triage processes, requiring automated prioritization based on exploitability and reachability rather than severity alone.
License Laundering
AI assistants generate code snippets derived from copyleft sources like GPL without retaining license information. 68% of codebases contain license conflicts. Furthermore, only 54% evaluate AI-generated code for IP and licensing risks, accumulating legal debt that surfaces during M&A or product launches.
Supply Chain Attacks
Attackers compromise upstream packages because one compromised component reaches thousands downstream. Typosquatting and dependency confusion exploit naming patterns. Therefore, organizations need curation-first models that block malicious packages at ingestion rather than discovering them in production.
Abandoned Project Risk
When maintainers abandon projects, vulnerabilities remain unpatched indefinitely. Organizations using abandoned dependencies have no support department to contact. As a result, assessing release frequency and maintainer activity before adoption is essential due diligence that many teams skip.

“The ship-and-forget model of software delivery is no longer viable.”

— Black Duck 2026 OSSRA Report

How Open Source Governance Must Evolve

Open source governance must evolve from reactive vulnerability scanning to proactive supply chain management that covers the full lifecycle from adoption through retirement.

CapabilityTraditional ApproachModern Governance
VisibilityManifest-based scanning only✓ Full SCA including AI-generated and copy-pasted code
Vulnerability ManagementCVE scanning after deployment✓ Curation-first blocking at ingestion
License ComplianceManual review at release✓ Automated license conflict detection in CI/CD
Dependency HealthIgnored until vulnerabilities appear◐ Proactive assessment of maintainer activity and release frequency
Regulatory ComplianceBest-effort documentation✓ EU CRA-compliant SBOMs with continuous updates

Notably, the EU Cyber Resilience Act represents a fundamental change in liability. If your product incorporates open source software, you are now legally responsible for the security of that component. Furthermore, the CRA mandates proactive cybersecurity measures and rigorous reporting. The use-at-your-own-risk disclaimer of open source is effectively overruled by legislation. As a result, organizations must implement software composition analysis tools integrated into CI/CD pipelines that provide continuous visibility rather than periodic scanning that misses the components entering through AI generation and direct code inclusion.

The AI-Generated Code Blind Spot

85% of organizations use AI coding assistants. 76% that prohibit them acknowledge developers use them anyway. AI-generated code enters codebases without the license, provenance, or security metadata that traditional package managers provide. Only 54% evaluate AI-generated code for IP risks. License laundering occurs when AI generates code derived from copyleft sources without attribution. One audited codebase contained 2,675 distinct license conflicts. This invisible code represents the largest governance gap in modern software development.

Building Effective Open Source Governance

Effective open source governance requires organizational commitment across security, legal, engineering, and procurement functions working together rather than in isolation. Furthermore, the CNCF model provides a blueprint for governance maturity. Projects progress through Sandbox, Incubating, and Graduated stages with security assessments at each level. However, most enterprise open source consumption lacks similar rigor. Moreover, organizations must formalize support contracts or usage-based funding for the libraries they rely on most heavily. Critical infrastructure depending on volunteer maintainers represents an unacceptable business risk that must be addressed through direct financial investment in the open source projects that underpin revenue-generating systems.

Governance Best Practices
Integrating SCA tools into CI/CD pipelines for continuous dependency scanning
Assessing maintainer activity and release frequency before adopting new packages
Evaluating AI-generated code for license compliance and security risks
Funding critical open source dependencies through support contracts
Governance Anti-Patterns
Relying on manifest-based scanning that misses AI-generated code
Ignoring transitive dependencies where 95% of vulnerabilities exist
Treating open source adoption as a developer decision without governance review
Assuming open source license compliance is a legal-only concern

Five Open Source Governance Priorities for 2026

Based on the OSSRA data, here are five priorities for governance programs:

  1. Implement full-spectrum software composition analysis: Because 17% of components enter outside package managers, deploy SCA tools that detect AI-generated, copy-pasted, and vendor-included code. Consequently, you gain visibility into the actual dependency landscape rather than the partial view that manifest scanning provides.
  2. Establish AI-generated code governance policies: Since 85% use AI assistants and only 54% evaluate output for IP risks, create review processes for AI-generated code covering license compliance and security. Furthermore, policy must address the 76% using tools despite prohibitions.
  3. Build EU CRA compliance capabilities now: With CRA making organizations legally responsible for open source security, implement SBOM generation, vulnerability management, and incident reporting aligned with regulatory requirements. As a result, compliance readiness prevents enforcement penalties.
  4. Assess and fund critical open source dependencies: Because abandoned projects create unpatched vulnerability risks, identify which dependencies are critical to operations and ensure they receive maintainer support. Therefore, funding maintainers prevents the abandonment that creates security crises.
  5. Automate license conflict detection in CI/CD: Since 68% of codebases contain license conflicts with the largest year-over-year increase in OSSRA history, embed automated license scanning into every build pipeline. In addition, early detection prevents legal debt from accumulating to crisis levels.
Key Takeaway

Open source governance is the critical challenge after open source won infrastructure. Vulnerabilities doubled to 581 per codebase. 68% have license conflicts. 95% of vulnerabilities in transitive dependencies. 85% use AI assistants. Only 54% evaluate AI code for IP risks. 17% of components bypass package managers. EU CRA imposes legal liability. Maintainer burnout threatens critical projects. Organizations must implement full-spectrum SCA, govern AI-generated code, fund maintainers, and automate license compliance.


Looking Ahead: Governance as Competitive Advantage

Open source governance will evolve from risk management into competitive advantage as regulated industries require provable software supply chain security. Organizations with mature governance will close enterprise deals faster because they can produce SBOMs and compliance evidence on demand. Furthermore, verified open source consumption tiers will emerge where high-security packages undergo additional vetting by the ecosystems themselves or by intermediaries. The CNCF graduation process provides a model for this tiered approach, requiring comprehensive security audits and governance standards before projects achieve the trust level that enterprise adoption truly demands. Moreover, organizations funding their critical dependencies will gain priority access to vulnerability patches and security updates. Furthermore, package repositories will implement verified tiers with additional vetting for high-security packages. The ecosystem will bifurcate between governed and ungoverned open source consumption.

However, organizations without governance face escalating legal, security, and compliance risks. In contrast, those building governance capabilities now will operate with confidence as regulations expand globally. For engineering leaders, open source governance is therefore the discipline determining whether open source remains a strategic advantage or becomes an unmanaged liability. The organizations investing in governance now will operate with confidence as regulations expand globally while those without governance face compounding and rapidly escalating legal, security, and compliance costs that grow with every single ungoverned dependency silently added to every codebase across every team.

Related GuideOur DevOps Services: Open Source Governance and Supply Chain Security


Frequently Asked Questions

Frequently Asked Questions
Why has open source governance become urgent?
Vulnerabilities doubled to 581 per codebase. 68% have license conflicts. EU CRA makes organizations legally liable. AI assistants generate ungoverned code at scale. 17% of components bypass package managers. The volume and velocity of open source risk now exceeds manual governance capacity.
What is the biggest open source governance risk?
Transitive dependencies where 95% of vulnerabilities exist. A single direct dependency can pull in dozens of nested packages. Traditional tools miss AI-generated and copy-pasted code. Full-spectrum SCA covering all code sources is essential for actual visibility into risk.
What does the EU CRA require for open source?
The CRA makes organizations legally responsible for open source security in their products. It requires proactive cybersecurity measures, SBOM documentation, and rigorous vulnerability reporting. The use-at-your-own-risk disclaimer is overruled by legislation demanding accountability.
How does AI affect open source governance?
85% use AI coding assistants. Files per codebase grew 74%. AI generates code without license or provenance metadata. License laundering occurs when AI copies copyleft code without attribution. Only 54% evaluate AI output for IP risks. Governance must extend to AI-generated code.
What is the CNCF role in open source governance?
CNCF stewards critical projects like Kubernetes, Prometheus, and Envoy. Projects progress through Sandbox, Incubating, and Graduated stages with security assessments. CNCF develops hardening standards and policy frameworks. Its governance model ensures vendor neutrality through contribution caps and community oversight.

References

  1. 581 Vulnerabilities, 107% Increase, 68% License Conflicts, AI Blind Spots: Black Duck — 2026 OSSRA Report: Open Source Vulnerabilities Double
  2. 60-80% Codebases, 95% Transitive, Supply Chain Attacks: Security Journey — Top 10 Open Source Software Security Risks
  3. Maintainer Burnout, EU CRA, Ecosystem Bifurcation, Funding: ActiveState — Predictions for Open Source in 2026
Weekly Briefing
Security insights, delivered Tuesdays.

Join 1 million+ security professionals. Practical, vendor-neutral analysis of threats, tools, and architecture decisions.