OSS Supply Chain Risk Scoring - Where abandoned packages come to rest
Project description
Ossuary
OSS Supply Chain Risk Scoring - Where abandoned packages come to rest.
Ossuary analyzes open source packages to identify governance-based supply chain risks before incidents occur. It calculates a risk score (0-100) based on maintainer concentration, activity patterns, protective factors, and takeover detection.
What It Detects
Ossuary targets the subset of supply chain attacks where governance weakness is a precondition - social engineering takeovers, abandoned packages, governance disputes. High maintainer concentration isn't inherently dangerous (pciutils has been maintained by one person for 28 years), but combined with other signals it becomes meaningful.
| Can Detect | Cannot Detect |
|---|---|
| Social engineering takeover (xz pattern) | Account compromise (stolen tokens) |
| Abandoned packages | Dependency confusion |
| Governance disputes (left-pad pattern) | Typosquatting |
| Newcomer takeover patterns | CI/CD exploits |
| Economic frustration signals | Active maintainer sabotage |
Quick Start
# Install from PyPI
pip install ossuary-risk
# Set GitHub token for API access (optional but recommended)
export GITHUB_TOKEN=ghp_xxxxxxxxxxxxx
# Initialize database
ossuary init
# Score a single package
ossuary score event-stream -e npm
ossuary score numpy -e pypi
ossuary score serde -e cargo
# Score with historical cutoff (T-1 analysis)
ossuary score event-stream -e npm --cutoff 2018-09-01
# Score an entire dependency tree
ossuary score-deps transformers -e pypi
# Show dependency tree with risk scores
ossuary deps express
# Generate xkcd-2347 tower visualization
ossuary xkcd-tree transformers -e pypi --tower -o tower.svg
# Batch score from seed file
ossuary seed-custom seeds/pypi-popular.yaml
# Show packages with biggest score changes
ossuary movers
Supported Ecosystems
npm, PyPI, Cargo, RubyGems, Packagist, NuGet, Go, GitHub
Scoring Methodology
Final Score = Base Risk + Activity Modifier + Protective Factors
(20-100) (-30 to +20) (-70 to +20)
Base Risk from maintainer concentration. Activity Modifier rewards active maintenance, penalizes abandonment. Protective Factors include maintainer reputation, funding (GitHub Sponsors), org ownership, visibility (downloads/stars), community size, and takeover detection.
Takeover Detection (novel contribution): compares each contributor's recent commit share vs historical baseline. A newcomer jumping from 2% to 50% on a mature project triggers an alert. Guards prevent false positives for established contributors, long-tenure maintainers, and internal org handoffs.
See methodology for full details.
Visualization
The xkcd-tree command generates dependency tower diagrams inspired by xkcd 2347. Block color = risk score, block width = contributor count, arrow = most structurally critical dependency.
ossuary score-deps transformers -e pypi # score all deps first
ossuary xkcd-tree transformers -e pypi --tower -o tower.svg
Dashboard
# Install with dashboard dependencies
pip install "ossuary-risk[dashboard]"
# Run dashboard
ossuary dashboard
Features: risk overview, ecosystem breakdown, package detail with score history, delta detection (biggest movers).
REST API
ossuary api
curl http://localhost:8100/score/pypi/flask
curl http://localhost:8100/check/npm/express
Interactive docs at http://localhost:8100/docs.
Validation
Validated on 158 packages across 8 ecosystems:
- Accuracy: 89.2%
- Precision: 95.8% (1 false positive: rxjs)
- Recall: 59.0%
- F1 Score: 0.73
All 16 false negatives are account compromises or CI/CD exploits — attack types governance scoring explicitly does not detect. Among governance-detectable attack types, recall is 100%.
See validation report for full analysis.
Development
git clone https://github.com/anicka-net/ossuary-risk.git
cd ossuary-risk
python -m venv .venv && source .venv/bin/activate
pip install -e ".[dev,dashboard]"
cp .env.example .env # add GITHUB_TOKEN
ossuary init
Configuration
GITHUB_TOKEN=ghp_xxxxxxxxxxxxx # GitHub API access (recommended)
DATABASE_URL=sqlite:///ossuary.db # Default; supports PostgreSQL
OSSUARY_CACHE_DAYS=7 # Score freshness threshold
License
MIT
Academic Context
MBA thesis research on OSS supply chain risk (due Dec 2026). The tool was co-developed with Claude (Anthropic). AI assistance was used for data collection, analysis scripts, and working notes. All thesis text is the author's own.
Key contribution: governance-based risk indicators are observable in public metadata before incidents occur, but they address a specific attack subset — not a universal detector.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ossuary_risk-0.7.1.tar.gz.
File metadata
- Download URL: ossuary_risk-0.7.1.tar.gz
- Upload date:
- Size: 469.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.11
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
763658508420243f17ad709d12044e7016e458075a91677c382fa3018ab49d1b
|
|
| MD5 |
eb23797a0f0377e09a1723095810823c
|
|
| BLAKE2b-256 |
c40e9221e1c88dba6914705125d234b306ece531e73b8097caae01ea5a0cd33f
|
File details
Details for the file ossuary_risk-0.7.1-py3-none-any.whl.
File metadata
- Download URL: ossuary_risk-0.7.1-py3-none-any.whl
- Upload date:
- Size: 90.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.11
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d84439a8e022fceb92916fa95c983018af70843d6d2b0b31c6ca3d1c7d319556
|
|
| MD5 |
6fb3fb80afe00e53c4c0434960f89986
|
|
| BLAKE2b-256 |
34533a05a3ca1525e52d66bc4758571a69355259d588258824e21bed022402a6
|