Implement industry-leading secure software development practices and validate the practices they follow so organizations can have the same confidence in the security of their open source that they have in their own code.
Contractually commit to continue these practices into the future so that organizations can confidently make long term investments in the packages they use.
With Tidelift, security, engineering, and product leaders can gain confidence in the open source powering their applications:
Reduce cybersecurity attack vectors from packages not following secure software development practices.
Ensure open source package security is owned by maintainers paid to handle it end to end—including the security of the maintainers' own transitive dependencies.
Avoid costly rework caused by packages that are abandoned or left insecure.
Get more accurate and actionable early signals of risk so problematic packages can proactively be removed or avoided.
Make better upfront package selections based on a fuller understanding of their security and maintenance practices.
Tidelift works with our maintainer partners to give application development teams timely access to critical insights about the security practices of the open source packages they rely on. By using these insights to proactively improve the security and resilience of the open source powering their applications, organizations reduce risk to their revenue, data, and business continuity.
For organizations that have historically relied heavily on software scanning (also known as Software Composition Analysis or SCA) to improve open source security, Tidelift's approach of partnering with maintainers to proactively impact software security represents a powerful additional way to achieve even better security outcomes.
jackson-databind
minimist
urllib3
SockJS
Jordan Harband
Pillow
Mongoose
Apache Commons
Tidelift’s maintainer partners validate that their projects follow industry standard secure development best practices like those recommended in the NIST Secure Software Development Framework and the OpenSSF scorecards.
This gives organizations the confidence that their open source dependencies follow the secure development practices most enterprises expect. With maintainer-validated insights from Tidelift, organizations can quickly determine:
Is a package actively maintained or is it deprecated?
What security and maintenance practices does it follow?
Are the maintainers actively responding to security issues?
Are the maintainers producing new releases?
Are the maintainers supported by a foundation, a company, or other income sources?
Does it conform to my organization’s license policies?
Curious about how this helps your organization in the real world?
When it comes to open source software security, many organizations rely heavily on software scanning (often called software composition analysis or SCA) as the primary means of defense.
The results of the 2024 Tidelift state of the open source maintainer report are live! In this year's survey, we identified 12 big headlines out of the data we collected from 400 open source maintainers.
Cisco’s internal development teams, using Corona enhanced with open source metadata provided by Tidelift, can now access insightful package metadata and gain additional insights into vulnerabilities.