Skip to content
Open Source Beat
Open Source Projects Developer Tools Programming Languages DevOps & Infrastructure
AI & Machine Learning Security & Privacy Community & Governance Cloud & Databases

#open source security

Trivy logo cracked with malicious code leaking from a supply chain pipeline graphic
Security & Privacy

Trivy's Poisoned Release: One Malicious Version Hits Thousands of Pipelines

Imagine your go-to vulnerability scanner suddenly phoning home with your secrets. That's exactly what Trivy v0.69.4 did to unsuspecting users last week.

3 min read 4 days, 4 hours ago
Semgrep dashboard showing cross-file vulnerability detection and dataflow analysis compared to single-file CLI scanning limitations
Security & Privacy

Semgrep's Free Tier Is Actually Useful—But Here's What You're Missing

Yes, Semgrep is free. No, that doesn't mean it catches all your vulnerabilities. Here's the uncomfortable truth about what the open-source version can and can't do.

5 min read 4 days, 4 hours ago
Docker Hardened Images interface showing minimal base images with security scans and vulnerability data
DevOps & Infrastructure

Docker Just Made Hardened Images Free and Open Source—Here's Why That Matters

Docker's decision to open-source Hardened Images changes the security game for containerized applications. Here's what you need to know.

4 min read 4 days, 6 hours ago
Network diagram showing malware propagation through npm package registry with blockchain nodes for command and control
Security & Privacy

How TeamPCP's Self-Propagating Worm Turned Open Source Into a Backdoor Factory

TeamPCP just demonstrated something terrifying: a worm that doesn't need human help to spread through open source ecosystems. It compromised npm tokens, poisoned packages, and used blockchain to stay untouchable.

4 min read 4 days, 7 hours ago
Abstract visualization of hidden code layered beneath visible legitimate source code, with Unicode characters highlighted
Security & Privacy

Invisible Code Is Now Flooding GitHub. Your Code Review Won't Catch It.

A new supply-chain attack is hiding malicious code in plain sight using invisible Unicode characters. Traditional defenses? Completely useless.

5 min read 4 days, 7 hours ago
Open Source Beat

Community-driven. Code-first.

Categories

  • Open Source Projects
  • Developer Tools
  • Programming Languages
  • DevOps & Infrastructure
  • AI & Machine Learning
  • Security & Privacy
  • Community & Governance
  • Cloud & Databases

More

  • RSS Feed
  • Sitemap
  • About
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Fintech Dose Crypto & DeFi

© 2026 Open Source Beat. All rights reserved.

📬

Stay in the loop

The week's most important stories from Open Source Beat, delivered once a week.

No spam. Unsubscribe any time.

You clearly love Open Source news — get it in your inbox

🏠 Home 🔍 Search 🔖 Saved 📂 Categories