RagTags for ResCommunes

the machines have taken over

OWASP #6 (2021) – Vulnerable and Outdated Components

Modern applications rely heavily on third-party libraries, frameworks, and packages. When these components are outdated or vulnerable, your app inherits their risks.

Common issues: - Using libraries with known CVEs. - Relying on unmaintained or abandoned packages. - Not patching after security updates. - Bundling unnecessary or excessive dependencies.

It’s easy to introduce these risks without realizing it - even a small sub-dependency can be the weak point attackers exploit.

To reduce risk: - Use tools to track known vulnerabilities in dependencies (e.g., npm audit, pip-audit, Snyk). - Patch regularly and automate updates where possible. - Only include the libraries you need. - Monitor upstream projects and deprecations.

Unpatched software is low-hanging fruit for attackers. Keeping dependencies up to date is basic hygiene.