Skip to main content

OSS Supply Chain Risk Scoring - Where abandoned packages come to rest

Project description

Ossuary

OSS Supply Chain Risk Scoring - Where abandoned packages come to rest.

Ossuary analyzes open source packages to identify governance-based supply chain risks before incidents occur. It calculates a risk score (0-100) based on maintainer concentration, activity patterns, protective factors, and takeover detection.

What It Detects

Ossuary targets the subset of supply chain attacks where governance weakness is a precondition - social engineering takeovers, abandoned packages, governance disputes. High maintainer concentration isn't inherently dangerous (pciutils has been maintained by one person for 28 years), but combined with other signals it becomes meaningful.

Can Detect Cannot Detect
Social engineering takeover (xz pattern) Account compromise (stolen tokens)
Abandoned packages Dependency confusion
Governance disputes (left-pad pattern) Typosquatting
Newcomer takeover patterns CI/CD exploits
Economic frustration signals Active maintainer sabotage

Quick Start

# Install from PyPI
pip install ossuary-risk

# Set GitHub token for API access (optional but recommended)
export GITHUB_TOKEN=ghp_xxxxxxxxxxxxx

# Initialize database
ossuary init

# Score a single package
ossuary score event-stream -e npm
ossuary score numpy -e pypi
ossuary score serde -e cargo

# Score with historical cutoff (T-1 analysis)
ossuary score event-stream -e npm --cutoff 2018-09-01

# Score an entire dependency tree
ossuary score-deps transformers -e pypi

# Score every component in an SBOM (CycloneDX or SPDX)
ossuary score-sbom product.cdx.json
ossuary score-sbom product.spdx.json --enrich enriched.cdx.json --annex-vii report.json

# Estimate the implied maximum CRA support period
ossuary support-period lodash -e npm
ossuary support-period-sbom product.cdx.json

# Show dependency tree with risk scores
ossuary deps express

# Generate xkcd-2347 tower visualization
ossuary xkcd-tree transformers -e pypi --tower -o tower.svg

# Batch score from seed file (--repo-aware groups sibling packages
# that share a repo so the snapshot cache is warmed once per repo)
ossuary seed-custom seeds/pypi-popular.yaml --repo-aware

# Show packages with biggest score changes
ossuary movers

# Show cache state
ossuary cache-stats

Supported Ecosystems

npm, PyPI, Cargo, RubyGems, Packagist, NuGet, Go, GitHub

Scoring Methodology

Final Score = Base Risk + Activity Modifier + Protective Factors
             (20-100)      (-30 to +20)        (-70 to +20)

Base Risk from maintainer concentration. Activity Modifier rewards active maintenance, penalizes abandonment. Protective Factors include maintainer reputation, funding (GitHub Sponsors), org ownership, visibility (downloads/stars), community size, and takeover detection.

Takeover Detection (novel contribution): compares each contributor's recent commit share vs historical baseline. A newcomer jumping from 2% to 50% on a mature project triggers an alert. Guards prevent false positives for established contributors, long-tenure maintainers, and internal org handoffs.

See methodology for full details.

Visualization

The xkcd-tree command generates dependency tower diagrams inspired by xkcd 2347. Block color = risk score, block width = contributor count, arrow = most structurally critical dependency.

ossuary score-deps transformers -e pypi  # score all deps first
ossuary xkcd-tree transformers -e pypi --tower -o tower.svg

CRA Compliance Workflow

Ossuary plugs into a Cyber Resilience Act (Regulation (EU) 2024/2847) workflow:

  • ossuary score-sbom consumes the manufacturer's SBOM (CycloneDX or SPDX) and scores every component, mapping CRA Article 13(5) due-diligence on third-party components to a per-component governance signal.
  • --enrich writes the SBOM back with scores attached as CycloneDX components[].properties[] entries or SPDX 2.3 package-level annotations[] entries (validated against the official SPDX 2.3 JSON Schema in CI; an optional interop test round-trips through spdx-tools).
  • --annex-vii produces a structured, timestamped, methodology-versioned record suitable for inclusion in the Annex VII technical documentation required by Article 13(4).
  • ossuary support-period[-sbom] derives the implied maximum support period a manufacturer can defensibly claim under Article 13(8), bounded by the worst-governance critical dependency.

These outputs do not change the underlying scoring methodology; they are derivations on top of it. See methodology §12 for full details and the heuristic mapping behind the support-period derivation.

Dashboard

# Install with dashboard dependencies
pip install "ossuary-risk[dashboard]"

# Run dashboard
ossuary dashboard

Features: risk overview, ecosystem breakdown, package detail with score history, delta detection (biggest movers).

REST API

ossuary api
curl http://localhost:8100/score/pypi/flask
curl http://localhost:8100/check/npm/express

Interactive docs at http://localhost:8100/docs.

Validation

Validated on 164 packages across 8 ecosystems with a formal scoped validation framework:

Metric All incidents In-scope only (Scope B)
Accuracy 87.2% 94.7%
Precision 96.2% 96.0%
Recall 55.6% 77.4%
F1 Score 0.70 0.857

Ossuary detects governance risk, not all supply chain attacks. The "in-scope" metrics count only incidents where governance weakness was observable before the attack — governance decay, protestware, weak-governance compromise, and governance risk. Out-of-scope incidents (credential theft on healthy projects, CI/CD exploits) are included in the dataset but not counted against recall.

1 false positive (rxjs). 6 in-scope false negatives, all explainable (community forks, reputation-protected maintainers, untracked ownership transfers).

See validation report for full analysis.

Development

git clone https://github.com/anicka-net/ossuary-risk.git
cd ossuary-risk
python -m venv .venv && source .venv/bin/activate
pip install -e ".[dev,dashboard]"
cp .env.example .env  # add GITHUB_TOKEN
ossuary init

Configuration

GITHUB_TOKEN=ghp_xxxxxxxxxxxxx     # GitHub API access (recommended)
DATABASE_URL=sqlite:///ossuary.db  # Default; supports PostgreSQL
OSSUARY_CACHE_DAYS=7               # Score freshness threshold

License

MIT

Academic Context

MBA thesis research on OSS supply chain risk (VŠE Prague, due Dec 2026).

AI assistance declaration: The tool was co-developed with Claude Opus (Anthropic) and reviewed by OpenAI Codex/GPT. AI assistance was used for implementation, data collection, analysis scripts, and working notes. Code reviews by both models are marked in commit history via Co-Authored-By trailers. All thesis text is the author's own.

Key contribution: governance-based risk indicators are observable in public metadata before incidents occur, but they address a specific attack subset — not a universal detector.

Agent Contract

This repository accepts AI agent contributions. See AGENTS.md for the repository contract and spec/ for the machine-facing version. The contract emphasizes correctness, reproducibility, and academic honesty: agents must not overclaim results, fabricate sources, or let methodology, validation, code, and public documentation drift out of sync.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ossuary_risk-0.10.1.tar.gz (2.2 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ossuary_risk-0.10.1-py3-none-any.whl (1.7 MB view details)

Uploaded Python 3

File details

Details for the file ossuary_risk-0.10.1.tar.gz.

File metadata

  • Download URL: ossuary_risk-0.10.1.tar.gz
  • Upload date:
  • Size: 2.2 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for ossuary_risk-0.10.1.tar.gz
Algorithm Hash digest
SHA256 1574dc8204f8868b47139e58458f68fd25dc2bbc931771fe4f7f56c96b1b3f71
MD5 1b69ddec6166cf04c8d030db958f2c14
BLAKE2b-256 b35de668db951dd8eac555cfd93ea56a31c35975c75d39e7bd0baf873e4a2379

See more details on using hashes here.

File details

Details for the file ossuary_risk-0.10.1-py3-none-any.whl.

File metadata

  • Download URL: ossuary_risk-0.10.1-py3-none-any.whl
  • Upload date:
  • Size: 1.7 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for ossuary_risk-0.10.1-py3-none-any.whl
Algorithm Hash digest
SHA256 603a0d4f224e548d0da9fbf606b42998aeb1777067713a4349e9af4ef2b7033b
MD5 b969df5dcf10489f2a5da0b040d8693b
BLAKE2b-256 565f77ce67304a78173e8b92915bb539fc9fcba21701cd28abba3539e05f8854

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page