SlideShare a Scribd company logo
Open Source Security and ChatGPT:
Navigating Concerns while Enhancing
Development
with Javier Perez
Chief Evangelist & Sr. Director of Product Management
javierperez.mozello.com
www.linkedin.com/in/javierperez
Tech Evangelist | Open Source Advocate | OSS Program Leader | Product Management
Product Marketing | App Security | Speaker | Blogger | Startups | Ex-Red Hat | Ex-IBM
Javier Perez
Perforce Software
2.6M +
720 packages/day
575K +
182 packages/day
384K +
86 packages/day
475K +
211 packages/day
379K +
161 packages/day
178K +
12 packages/day
Source: Nov 16, 2023 www.modulecounts.com
350+
Projects
850+
Projects
157+
Projects
418+
Projects
30+
Projects
Source: 2022 Foundation annual reports
Source code is publicly available
Open to collaboration
Source code available with a license that
permits users to freely run, study, modify
and redistribute
Freedom to deploy anywhere
Open Source Software
Source: AI-generated with DALL-E
Open source libraries are reused by
other open source
Libraries can have up to 1000s of
dependencies
Same issue with proprietary
software since they are all using OSS
Source: AI-generated with DALL-E
Example: Apache Commons IO Library
Used by:
26,486
artifacts
Apache
Commons
Lang
27,309
AssertJ
16,216
Spring
Web
8,400
Apache
Log4j
10,205 Fastjson
6,347
Snake
YAML
Hadoop
Common
Zoo
Keeper
Selenium
Java
* Source: MavenRepository.com (Nov 16, 2023)
* Sources: graphcommons.com
Example: Apache Commons IO Library
Used by:
26,486
artifacts
Apache
Commons
Lang
27,309
AssertJ
16,216
Spring
Web
8,400
Apache
Log4j
10,205 Fastjson
6,347
Snake
YAML
Hadoop
Common
Zoo
Keeper
Selenium
Java
* Source: MavenRepository.com (Nov 16, 2023)
* Sources: graphcommons.com
It’s about Vulnerabilities
Common Vulnerability and Exposures (CVE)
Common Vulnerability Score System (CVSS)
Vulnerabilities outside CVE and NVD
Open Source Software Security
Source: AI-generated with DALL-E
New vulnerabilities are constantly
being discovered
The smart way to make them public is
when you have a fix (public disclosure)
More than 95% of public vulnerabilities
have a fix, but you must keep up with
the latest releases/patches
Source: AI-generated with DALL-E
OpenAI’s ChatGPT took the world by
storm, over 100 million users in the
first two months after its public launch
ChatGPT or other AI-based tools allow developers
to produce code more quickly and more efficiently
Validity of the Code
Without context the validity of the code can be questioned.
Are developers going to relay entirely on ChatGPT-generated code?
Developers don’t take ChatGPT’s output as the final word.
AI-generated code is should be just the baseline.
Just like using code from Stack Overflow, GitHub, NPM, etc.
C O N C E R N 1
R E S P O N S E
Training Data
ML/DL model training must be fair, robust and explainable.
Where is the data coming from? Garbage in, garbage out.
ChatGPT’s code outputs are not guaranteed to be perfect.
But ChatGPT can explain new or existing code,
it can also effectively provide unit tests for code,
which will help with writing better software faster.
C O N C E R N 2
R E S P O N S E
Ownership
Can I use and distribute AI-generated code?
What about license compliance?
The code that ChatGPT outputs should not be considered
in a final state or copyrightable.
AI-generated code is not supposed to be identical to other code, if it
is, Microsoft cover legal challenges related to copyright grounds
(paid version)
C O N C E R N 3
R E S P O N S E
Job Displacement
AI tools and ChatGPT are going to make
developer jobs redundant.
Deeper testing shows inaccuracies, unreliable code, and content.
ChatGPT won’t immediately create new or different jobs.
Encourage developers and open source developers to embrace
ChatGPT, GitHub Copilot and other tools to explore possibilities.
C O N C E R N 4
R E S P O N S E
Security
AI-generated code is going to
introduce vulnerabilities.
It’s the developer’s responsibility to use code ethically and safely.
It’s also important to carefully review any code generated
by ChatGPT and ensure that it doesn’t introduce
vulnerabilities. Same as it’s done today from other sources.
C O N C E R N 5
R E S P O N S E
ChatGPT has already proven to be an effective educational tool.
Consider asking for book recommendations about
programming languages and coding; it delivers short
descriptions for each book.
Prompt it for the top takeaways from one specific book.
Translate code from one programming language to another.
Other Security Concerns
• Phishing attacks: ChatGPT affords bad
foreign actor to near fluency in English
• Malicious code: AI is programmed not
to generate code that it deems to be
malicious. Code generation can still be
manipulated and updated to create
malicious code, same as any other
source of code.
Source: AI-generated with DALL-E
If ChatGPT can assist bad actors, remember that this same
power is equally available to good actors.
Source: AI-generated with DALL-E
Dev Security Education
• Security Champions Needed
• Knowledge of OWASP Top Ten
Many Contributors
“Given enough eyeballs, all bugs are
shallow” – Linus’ Law
Vulnerabilities in Open Source
Source: AI-generated with DALL-E
OWASP Top 10 Vulnerabilities
• Broken Access Control
• Cryptographic Failures (sensitive data exposure)
• Injection (SQL, NoSQL, OS, LDAP, Cross-site scripting)
• Insecure Design
• Security Misconfiguration
• Vulnerable and Outdated Components (CVEs and EOL software)
• Identification and Authentication Failures
• Software and Data Integrity Failures
• Security Logging & Monitoring Failures
• Server-Side Request Forgery (SSRF)
Top 10
• Identify open source libraries, generate
software bill of materials (SBOMs)
• Identify vulnerabilities and severity on libraries
and dependencies
• Prioritization, alerts, and security policies
• Integrate with build environment (CI pipeline)
Vulnerabilities Scanners
Source: AI-generated with DALL-E
• OWASP Dependency-Checker
• NPM audit
• GitHub vulnerability alerts
• GitLab dependency scanning
• SAP code vulnerability analyzer
Open Source or Free Scanners
Source: AI-generated with DALL-E
SBOMs Generation
• OWASP Dependency-Track
• SBOM Tool (Microsoft)
• Syft and Grype
• CycloneDx-CLI
• OSV-Scanner
Source: AI-generated with DALL-E
Public Vulnerability Databases
National Vulnerability Database nvd.nist.gov
GitHub Advisory Database github.com/advisories
Mend Vulnerability Database
mend.io/vulnerability-database
NPM Security Advisory npmjs.com/advisories
Sonatype OSS Index ossindex.sonatype.org
VulDB vuldb.com
Metasploit rapid7.com/db
Source: AI-generated with DALL-E
“Open Source Security is about
visibility of vulnerabilities, apply
patches, avoid EOL versions, and
making scans part of SDLC.”
“Whether it’s reviewing code,
pair programming or learning
from fellow developers,
humans will not be replaced by
generative AI, only enhanced.”
“Take advantage of the new tools and
treat AI-generated code as any other
code: with bugs and vulnerabilities.”
Chief Evangelist & Sr. Director of Product Management
javierperez.mozello.com
www.linkedin.com/in/javierperez
Javier Perez
Perforce Software
Thank You!
Images generated with OpenAI’s DALL-E via Microsoft Bing Image Creator
Article à

More Related Content

Similar to Open Source Security and ChatGPT-Published.pdf (20)

PDF
Artificial Intelligence (AI) Security, Attack Vectors, Defense Techniques, Et...
Salman Baset
 
PDF
Open Source in Real Life
Kenneth Geisshirt
 
PDF
The Aipowered Developer Meap V01 Chapters 1 To 4 Of 8 Nathan B Crocker
partherout
 
PDF
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
PPTX
(Isc)² secure johannesburg
Tunde Ogunkoya
 
PPTX
Intro to open source - 101 presentation
Javier Perez
 
PDF
Implications of Open Source Software Use (or Let's Talk Open Source)
Gail Murphy
 
PDF
Open Source Licenses
Ortus Solutions, Corp
 
PDF
OpenAI’s Next AI Agent is a Self-Testing Software Engineer that Hired Itself ...
derrickjswork
 
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
PPTX
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
PPTX
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
 
PPTX
Contemporary software TRENDS SOFTWARE TRENDS
melissaguillermo
 
PPTX
AI Open-Source Models- Benefits vs. Risks.
Natan Katz
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PPT
Open Source Issues and Trends
Nicole Baratta
 
PDF
An Elaborate Take on ChatGPT Security Risks for 2025 | USCSI®
United States Cybersecurity Institute (USCSI®)
 
PDF
Say No To Dependency Hell
Nicola Pedot
 
PPTX
Generative AI Use-cases for Enterprise - First Session
Gene Leybzon
 
PDF
OpenChain Webinar 57 - The Open Source Initiative - 2023-11-27
Shane Coughlan
 
Artificial Intelligence (AI) Security, Attack Vectors, Defense Techniques, Et...
Salman Baset
 
Open Source in Real Life
Kenneth Geisshirt
 
The Aipowered Developer Meap V01 Chapters 1 To 4 Of 8 Nathan B Crocker
partherout
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
(Isc)² secure johannesburg
Tunde Ogunkoya
 
Intro to open source - 101 presentation
Javier Perez
 
Implications of Open Source Software Use (or Let's Talk Open Source)
Gail Murphy
 
Open Source Licenses
Ortus Solutions, Corp
 
OpenAI’s Next AI Agent is a Self-Testing Software Engineer that Hired Itself ...
derrickjswork
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
 
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
 
Contemporary software TRENDS SOFTWARE TRENDS
melissaguillermo
 
AI Open-Source Models- Benefits vs. Risks.
Natan Katz
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Open Source Issues and Trends
Nicole Baratta
 
An Elaborate Take on ChatGPT Security Risks for 2025 | USCSI®
United States Cybersecurity Institute (USCSI®)
 
Say No To Dependency Hell
Nicola Pedot
 
Generative AI Use-cases for Enterprise - First Session
Gene Leybzon
 
OpenChain Webinar 57 - The Open Source Initiative - 2023-11-27
Shane Coughlan
 

Recently uploaded (17)

PPTX
Pastor Bob Stewart Acts 21 07 09 2025.pptx
FamilyWorshipCenterD
 
PPTX
presentation on legal and regulatory action
raoharsh4122001
 
PDF
Leveraging the Power of Jira Dashboard.pdf
siddharthshukla742740
 
PPTX
some leadership theories MBA management.pptx
rkseo19
 
PPTX
2025-07-06 Abraham 06 (shared slides).pptx
Dale Wells
 
PPTX
Great-Books. Powerpoint presentation. files
tamayocrisgie
 
PDF
The Family Secret (essence of loveliness)
Favour Biodun
 
PDF
The Impact of Game Live Streaming on In-Game Purchases of Chinese Young Game ...
Shibaura Institute of Technology
 
PDF
Buy Verified Payoneer Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
PDF
The Origin - A Simple Presentation on any project
RishabhDwivedi43
 
PDF
From Draft to DSN - How to Get your Paper In [DSN 2025 Doctoral Forum Keynote]
vschiavoni
 
PPTX
Presentationexpressions You are student leader and have just come from a stud...
BENSTARBEATZ
 
PPTX
STURGEON BAY WI AG PPT JULY 6 2025.pptx
FamilyWorshipCenterD
 
PPTX
BARRIERS TO EFFECTIVE COMMUNICATION.pptx
shraddham25
 
PPTX
AI presentation for everyone in every fields
dodinhkhai1
 
PPTX
Inspired by VeinSense: Supercharge Your Hackathon with Agentic AI
ShubhamSharma2528
 
PDF
Buy Verified Coinbase Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
Pastor Bob Stewart Acts 21 07 09 2025.pptx
FamilyWorshipCenterD
 
presentation on legal and regulatory action
raoharsh4122001
 
Leveraging the Power of Jira Dashboard.pdf
siddharthshukla742740
 
some leadership theories MBA management.pptx
rkseo19
 
2025-07-06 Abraham 06 (shared slides).pptx
Dale Wells
 
Great-Books. Powerpoint presentation. files
tamayocrisgie
 
The Family Secret (essence of loveliness)
Favour Biodun
 
The Impact of Game Live Streaming on In-Game Purchases of Chinese Young Game ...
Shibaura Institute of Technology
 
Buy Verified Payoneer Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
The Origin - A Simple Presentation on any project
RishabhDwivedi43
 
From Draft to DSN - How to Get your Paper In [DSN 2025 Doctoral Forum Keynote]
vschiavoni
 
Presentationexpressions You are student leader and have just come from a stud...
BENSTARBEATZ
 
STURGEON BAY WI AG PPT JULY 6 2025.pptx
FamilyWorshipCenterD
 
BARRIERS TO EFFECTIVE COMMUNICATION.pptx
shraddham25
 
AI presentation for everyone in every fields
dodinhkhai1
 
Inspired by VeinSense: Supercharge Your Hackathon with Agentic AI
ShubhamSharma2528
 
Buy Verified Coinbase Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
Ad

Open Source Security and ChatGPT-Published.pdf

  • 1. Open Source Security and ChatGPT: Navigating Concerns while Enhancing Development with Javier Perez
  • 2. Chief Evangelist & Sr. Director of Product Management javierperez.mozello.com www.linkedin.com/in/javierperez Tech Evangelist | Open Source Advocate | OSS Program Leader | Product Management Product Marketing | App Security | Speaker | Blogger | Startups | Ex-Red Hat | Ex-IBM Javier Perez Perforce Software
  • 3. 2.6M + 720 packages/day 575K + 182 packages/day 384K + 86 packages/day 475K + 211 packages/day 379K + 161 packages/day 178K + 12 packages/day Source: Nov 16, 2023 www.modulecounts.com
  • 5. Source code is publicly available Open to collaboration Source code available with a license that permits users to freely run, study, modify and redistribute Freedom to deploy anywhere Open Source Software Source: AI-generated with DALL-E
  • 6. Open source libraries are reused by other open source Libraries can have up to 1000s of dependencies Same issue with proprietary software since they are all using OSS Source: AI-generated with DALL-E
  • 7. Example: Apache Commons IO Library Used by: 26,486 artifacts Apache Commons Lang 27,309 AssertJ 16,216 Spring Web 8,400 Apache Log4j 10,205 Fastjson 6,347 Snake YAML Hadoop Common Zoo Keeper Selenium Java * Source: MavenRepository.com (Nov 16, 2023) * Sources: graphcommons.com
  • 8. Example: Apache Commons IO Library Used by: 26,486 artifacts Apache Commons Lang 27,309 AssertJ 16,216 Spring Web 8,400 Apache Log4j 10,205 Fastjson 6,347 Snake YAML Hadoop Common Zoo Keeper Selenium Java * Source: MavenRepository.com (Nov 16, 2023) * Sources: graphcommons.com
  • 9. It’s about Vulnerabilities Common Vulnerability and Exposures (CVE) Common Vulnerability Score System (CVSS) Vulnerabilities outside CVE and NVD Open Source Software Security Source: AI-generated with DALL-E
  • 10. New vulnerabilities are constantly being discovered The smart way to make them public is when you have a fix (public disclosure) More than 95% of public vulnerabilities have a fix, but you must keep up with the latest releases/patches Source: AI-generated with DALL-E
  • 11. OpenAI’s ChatGPT took the world by storm, over 100 million users in the first two months after its public launch
  • 12. ChatGPT or other AI-based tools allow developers to produce code more quickly and more efficiently
  • 13. Validity of the Code Without context the validity of the code can be questioned. Are developers going to relay entirely on ChatGPT-generated code? Developers don’t take ChatGPT’s output as the final word. AI-generated code is should be just the baseline. Just like using code from Stack Overflow, GitHub, NPM, etc. C O N C E R N 1 R E S P O N S E
  • 14. Training Data ML/DL model training must be fair, robust and explainable. Where is the data coming from? Garbage in, garbage out. ChatGPT’s code outputs are not guaranteed to be perfect. But ChatGPT can explain new or existing code, it can also effectively provide unit tests for code, which will help with writing better software faster. C O N C E R N 2 R E S P O N S E
  • 15. Ownership Can I use and distribute AI-generated code? What about license compliance? The code that ChatGPT outputs should not be considered in a final state or copyrightable. AI-generated code is not supposed to be identical to other code, if it is, Microsoft cover legal challenges related to copyright grounds (paid version) C O N C E R N 3 R E S P O N S E
  • 16. Job Displacement AI tools and ChatGPT are going to make developer jobs redundant. Deeper testing shows inaccuracies, unreliable code, and content. ChatGPT won’t immediately create new or different jobs. Encourage developers and open source developers to embrace ChatGPT, GitHub Copilot and other tools to explore possibilities. C O N C E R N 4 R E S P O N S E
  • 17. Security AI-generated code is going to introduce vulnerabilities. It’s the developer’s responsibility to use code ethically and safely. It’s also important to carefully review any code generated by ChatGPT and ensure that it doesn’t introduce vulnerabilities. Same as it’s done today from other sources. C O N C E R N 5 R E S P O N S E
  • 18. ChatGPT has already proven to be an effective educational tool. Consider asking for book recommendations about programming languages and coding; it delivers short descriptions for each book. Prompt it for the top takeaways from one specific book. Translate code from one programming language to another.
  • 19. Other Security Concerns • Phishing attacks: ChatGPT affords bad foreign actor to near fluency in English • Malicious code: AI is programmed not to generate code that it deems to be malicious. Code generation can still be manipulated and updated to create malicious code, same as any other source of code. Source: AI-generated with DALL-E
  • 20. If ChatGPT can assist bad actors, remember that this same power is equally available to good actors. Source: AI-generated with DALL-E
  • 21. Dev Security Education • Security Champions Needed • Knowledge of OWASP Top Ten Many Contributors “Given enough eyeballs, all bugs are shallow” – Linus’ Law Vulnerabilities in Open Source Source: AI-generated with DALL-E
  • 22. OWASP Top 10 Vulnerabilities • Broken Access Control • Cryptographic Failures (sensitive data exposure) • Injection (SQL, NoSQL, OS, LDAP, Cross-site scripting) • Insecure Design • Security Misconfiguration • Vulnerable and Outdated Components (CVEs and EOL software) • Identification and Authentication Failures • Software and Data Integrity Failures • Security Logging & Monitoring Failures • Server-Side Request Forgery (SSRF) Top 10
  • 23. • Identify open source libraries, generate software bill of materials (SBOMs) • Identify vulnerabilities and severity on libraries and dependencies • Prioritization, alerts, and security policies • Integrate with build environment (CI pipeline) Vulnerabilities Scanners Source: AI-generated with DALL-E
  • 24. • OWASP Dependency-Checker • NPM audit • GitHub vulnerability alerts • GitLab dependency scanning • SAP code vulnerability analyzer Open Source or Free Scanners Source: AI-generated with DALL-E
  • 25. SBOMs Generation • OWASP Dependency-Track • SBOM Tool (Microsoft) • Syft and Grype • CycloneDx-CLI • OSV-Scanner Source: AI-generated with DALL-E
  • 26. Public Vulnerability Databases National Vulnerability Database nvd.nist.gov GitHub Advisory Database github.com/advisories Mend Vulnerability Database mend.io/vulnerability-database NPM Security Advisory npmjs.com/advisories Sonatype OSS Index ossindex.sonatype.org VulDB vuldb.com Metasploit rapid7.com/db Source: AI-generated with DALL-E
  • 27. “Open Source Security is about visibility of vulnerabilities, apply patches, avoid EOL versions, and making scans part of SDLC.”
  • 28. “Whether it’s reviewing code, pair programming or learning from fellow developers, humans will not be replaced by generative AI, only enhanced.”
  • 29. “Take advantage of the new tools and treat AI-generated code as any other code: with bugs and vulnerabilities.”
  • 30. Chief Evangelist & Sr. Director of Product Management javierperez.mozello.com www.linkedin.com/in/javierperez Javier Perez Perforce Software Thank You! Images generated with OpenAI’s DALL-E via Microsoft Bing Image Creator Article à