Josh Bressers's Avatar

Josh Bressers

@josh.bressers.name

Mostly on Mastodon - VP of Security at Anchore - Open Source Security https://opensourcesecurity.io - Hacker History http://hackerhistory.com - He/Him

323 Followers  |  450 Following  |  140 Posts  |  Joined: 20.10.2024  |  1.6506

Latest posts by josh.bressers.name on Bluesky

Preview
EU Regulations will change everything with Daniel Thompson In this episode, we dive into the Product Liability Directive and Cyber Resilience Act with Daniel Thompson, CEO of Crab Nebula. The EUโ€™s new legislative framework impacts manufacturers in ways we don...

I talked to Daniel Thompson-Yvetot on the latest episode of #OpenSourceSecurity

The main topic was the coming regulation for software developers. While there are carve outs for open source projects, what counts as an open source project isn't as clear as I thought it was.

28.07.2025 16:22 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Open source microprocessors with Jan Pleskac In this episode Jan Pleskac, CEO and co-founder of Tropic Square, shares insights on the challenges and innovations in creating open and auditable hardware. While most hardware is very closed, Tropic ...

This #OpenSourceSecurity episode I chatted with Jan Pleskac from Tropic Square about open source microprocessors

I learned an incredible amount about how this all works, what Tropic Square is trying to do, and what we can start to expect in the future

21.07.2025 14:36 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Package URLs with Philippe Ombredanne Iโ€™m joined by Philippe Ombredanne, creator of the Package URL (PURL), to discuss the surprisingly complex and messy problem of simply identifying open source software packages. We dive into how PURLs ...

I chatted with Philippe Ombredanne about Package URLs, or PURLs. He created them, so he knows a thing or two.

We do complain about CPE quite a bit :)

But it's a really hard problem. It feels like a package identifier should be easy, but it's way harder than you think it is.

24.06.2025 17:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Hobbyist Maintainers with Thomas DePierre Thomas DePierre joins Open Source Security to discuss the central idea from his blog post, โ€œYou are all on the hobbyist maintainers turf now,โ€ exploring the massive disconnect between the corporate wo...

#OpenSourceSecurity chats with @Di4na@hachyderm.io about his blog post explaining hobbyist open source maintainers

Whatever you think you know about open source, you're going to learn something from this one

16.06.2025 13:40 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
STIG automation with Aaron Lippold I chat with Aaron Lippold, creator of MITREโ€™s Security Automation Framework (SAF), to discuss how to escape the pain of manual STIG compliance. We explore the technical details of open-source tools li...

This episode of #OpenSourceSecurity I chat with Aaron Lippold from MITRE about #STIG automation (it's one big open source project)

STIG has historically been incredibly difficult

Thanks to #FedRAMP it's getting more attention than ever before and the work Aaron has been doing makes it a lot easier

09.06.2025 14:21 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Ecosyste.ms with Andrew Nesbitt I recently chatted with Andrew Nesbitt about his project, Ecosyste.ms. Ecosyste.ms catalogs open source projects by tracking packages, dependencies, repositories, and more. With this dataset Andrew is...

This week #OpenSourceSecurity chats with @andrewnez.bsky.social about Ecosyste.ms

Ecosyste.ms is a massive collection of data about open source

It's an amazingly useful collection of data. If you're doing anything that needs information about open source you should check it out

02.06.2025 17:58 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Curl vs AI with Daniel Stenberg Daniel Stenberg, the maintainer of Curl, discusses the increase in AI security reports that are wasting the time of maintainers. We discuss Curlโ€™s new policy of banning the bad actors while establishi...

I chatted with @daniel.haxx.se about #Curl and the recent #AI happenings

It's always fun talking to Daniel, and I think there's a lot of good ideas in this one, especially on how to approach AI fueled contributions that aren't slop. And even suggestions on how to deal with slop contributions :)

27.05.2025 16:46 โ€” ๐Ÿ‘ 9    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Repository signing with Kairo De Araujo I recently had a chat with Kairo about a project he maintains called Repository Service for TUF (RSTUF). We explain why TUF is tough (har har har), what RSTUF can do, and some of the challenges around...

I spoke with Kairo De Araujo about signing package repositories with RSTUF. It's one of those topics that's incredibly hard and I learn so much anytime I chat with an expert

Just because you're using a package mirror doesn't mean you shouldn't think about signing the artifacts

19.05.2025 15:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Obfuscated JavaScript in Phishing Kits While sorting phishing kits this morning, I discovered a clever use of JavaScript to hide an infostealer.

Obfuscated JavaScript in Phishing Kits technicaloutcast.com...

16.05.2025 17:09 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Securing GitHub Actions with William Woodruff William Woodruff discussed his project, Zizmor, a security linter designed to help developers identify and fix vulnerabilities within their GitHub Actions workflows. This tool addresses inherent secur...

I chatted with @yossarian.net about securing GitHub Actions with Zizmor

I learned a ton, and given all the recent news about GitHub Actions, everyone should be looking at Zizmor

opensourcesecurity.io/2025/2025-05...

12.05.2025 14:50 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
BTS #49 - The Hidden Risks of Open Source Components - Eclypsium | Supply Chain Security for the Modern Enterprise In this episode, Paul Asadoorian and Josh Bressers delve into the complexities of open source supply chain security, discussing the prevalence of open source components in modern software, the challen...

I had the opportunity to join @paulasadoorian.bsky.social on the @eclypsium.bsky.social podcast to talk about open source and that whole supply chain thing

It was a fun chat and Paul is always a great host

eclypsium.com/podcasts/bts...

07.05.2025 00:44 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This was fun, make sure you check it out!

06.05.2025 14:32 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Embedded Security with Paul Asadoorian Recently, I had the pleasure of chatting with Paul Asadoorian, Principal Security Researcher at Eclypsium and the host of the legendary Paulโ€™s Security Weekly podcast. Our conversation dove into the o...

This episode of #OpenSourceSecurity I talk with @paulasadoorian.bsky.social about embedded security, but with an open source twist

It's open source all the way down. And old open source quite often. It's a really fun discussion, I learned a lot!

opensourcesecurity.io/2025/2025-05...

05.05.2025 16:21 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
tj-actions with Endor Lab's Dimitri Stiliadis Dimitri Stiliadis, CTO from Endor Labs, discusses the recent tj-actions/changed-files supply chain attack, where a compromised GitHub Action exposed CI/CD secrets. We explore the impressive multi-stag...

This episode of #OpenSourceSecurity I chat with Dimitri Stiliadis of @endorlabs.bsky.social about the tj-actions/changed-files backdoor

Endor did some great research into how many repos were affected and we cover some of the background on this attack. It's way weirder than you can imagine

28.04.2025 14:58 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Trust, Transparency, & the Future of the CVE Program When the cybersecurity community learned that the contract for MITREโ€™s operation of the CVE Programโ€”the system that assigns standardized identifiers for publicly known software vulnerabilitiesโ€”was at ...

Jen Easterly had some words to say about the CVE Foundation

www.linkedin.com/pulse/trust-...

26.04.2025 00:06 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
What's happening with CVE Iโ€™m not a super expert in all this, but I know enough to be dangerous. If I make any mistakes, please let me know (there are many ways to contact me listed in the โ€œContactโ€ menu). I will clearly mark ...

It's been a week since CVEmageddon

I try to answer some questions about the funding, what happened, and what could happen next

opensourcesecurity.io/2025/04-cve-...

#CVE #cybersecurity

23.04.2025 22:45 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
What's happening with CVE Iโ€™m not a super expert in all this, but I know enough to be dangerous. If I make any mistakes, please let me know (there are many ways to contact me listed in the โ€œContactโ€ menu). I will clearly mark ...

It's been a week since CVEmageddon

I try to answer some questions about the funding, what happened, and what could happen next

opensourcesecurity.io/2025/04-cve-...

#CVE #cybersecurity

23.04.2025 22:45 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Syft, Grype, and Grant with Alan Pope I chat with Alan Pope about the open source security tools Syft, Grype, and Grant. These tools help create Software Bills of Materials (SBOMs) and scan for vulnerabilities. Learn why generating and st...

I was a guest on the Open Source Security podcast with @josh.bressers.name, chatting about @syftproject.bsky.social , @grypeproject.bsky.social and other @anchore.com #opensource stuff.

opensourcesecurity.io/2025/2025-04...

21.04.2025 13:19 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

It's always amusing when I tell someone to search for "buffer overflow" on GitHub and it returns a ton of things

20.04.2025 11:54 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Can we trust CVE? If you are a security nerd, and even if youโ€™re not, you probably heard about the epic CVE mess that happened. Itโ€™s a very long story and was covered in many places, but the TL;DR was the funding for C...

I did some digging this evening into a few of the things that have emerged to fill the #CVE gap. It was much less inspiring than I had hoped it would be

opensourcesecurity.io/2025/04-can-...

19.04.2025 01:27 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Join the Extended Vulnerability Community Discord Server! Check out the Extended Vulnerability Community community on Discord - hang out with 465 other members and enjoy free voice and text chat.

@josh.bressers.name created a Discord server to discuss the situation: discord.gg/gSCrXxMuPx

16.04.2025 14:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I donโ€™t think itโ€™s a scam, but itโ€™s not the best way to build trust

16.04.2025 12:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

No names or details. Cool, cool

16.04.2025 10:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
CVE for EOL with Aaron Frost Aaron Frost explores the overly complex world of vulnerability identifiers for end of life software. We discuss how incomplete CVE reporting creates blind spots for users while arming attackers with k...

I had a chat with Aaron Frost from @hero.dev about #EOL and #CVE. It's a surprisingly complicated topic

If you're unsure an old version is affected, should you assume it is or isn't affected by a vulnerability?

opensourcesecurity.io/2025/2025-04...

14.04.2025 13:49 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Why I didn't go to VulnCon VulnCon 2025 is over. I didnโ€™t go. A bunch of people have asked me why, and rather than keep my answer to a small group, I thought it would make sense to write something public about it all. The TL;DR...

I've had a bunch of people ask me why I wasn't at #VulnCon, so I wrote a blog post about it

TL;DR - I don't think VulnCon should exist

Follow me for more security hot takes

opensourcesecurity.io/2025/04-why-...

11.04.2025 15:36 โ€” ๐Ÿ‘ 1    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Ecosystem Funds is Generally Available **Today Open Source Collective and ecosyste.ms are launching Funds supporting 291 Open Source Ecosystems. Unsurprisingly, we call them Ecosystem Funds.** A few, short weeks before the holidays we announced Ecosystem Funds; a collaboration between Open Source Collective and ecosyste.ms that makes it easier to support your critical software dependencies. ### What are Ecosystem Funds? Using billions of data points from ecosyste.ms weโ€™ve packaged millions of the most critical open source components into a few hundred Funds centred on a language, framework, or package, turning a process that can take months into a five minute conversation with your CTO. ### What have we been up to? We launched with a $67,500 commitment from Sentry to the Rust, Python, Django and Javascript Ecosystems. Weโ€™ve since distributed over 80% of the funds in 375 individual payments to 136 projects. Weโ€™ve sent money to projects on GitHub Sponsors, Patreon, BuyMeACoffee, Ko-fi, and of course Open Collective. We contacted hundreds maintainers, asking them to update their โ€˜funding.ymlโ€™ so anyone could support them, for those who didnโ€™t we paid maintainers directly, again through Open Collective. Weโ€™re hoping to distribute the remaining funds this month which is why weโ€™re launching Ecosystem Funds to the general public today. ### How does it work? Once again for those in the back: Sponsor the technology you depend upon, weโ€™ll do the rest. Find an ecosystem using our search and donate a single or recurring sponsorship. We handle everything else. Weโ€™ll direct your money (minus a 10% management fee) to maintainers, using the tools they have chosen to manage their finances. We allocate 100% of the donations in every fund with a balance of $1,000 or more, on a monthly basis. Every donation and payment is traceable through both Ecosystem Funds and Open Collective. Donations can be made directly through funds.ecosyste.ms or, if you have an account, on Open Collective. Companies who wish to make a large donation, or start a Fund of their own, can request an Invoice from Open Source Collective โ€” who are already an approved vendor to most large open-source-supporting organisations. ### Whatโ€™s next? While weโ€™re launching with nearly three hundred Funds weโ€™re certain that weโ€™ll have missed more than a few ecosystems around your favourite framework, tool, or package, and weโ€™re happy to add them. Just get in touch and weโ€™ll do some data wrangling to add it โ€” note that weโ€™re not going to include a Fund for just the projects you work on, thatโ€™s what GitHub Sponsors is for. Weโ€™re also hugely aware of the limitations of our approach. Weโ€™re missing all the standards bodies, documentation projects, and foundations who support open source outside of the dependency graph. Weโ€™re also missing domain-specific Funds, thereโ€™s no climate, marine, aviation, or space-exploration based Funds to support. To address this weโ€™ll be building ways for communities (and corporations) to package their own Ecosystem Fund, and support it. ### โ€ฆ Just one more thing While building a service to support thousands of the most critical software components might be enough for some, itโ€™s not for us. Over the coming months weโ€™ll be building a tool to track all your open source โ€˜investmentsโ€™, to better understand the impact your money is having on the projects you depend on most.

Ecosystem Funds is Generally Available https://blog.ecosyste.ms/2025/04/04/ecosystem-funds-ga.html

07.04.2025 17:19 โ€” ๐Ÿ‘ 10    ๐Ÿ” 10    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2

cargo-semver-checks has a *security* impact on Rust too.

Make version upgrades less painful, and people upgrade more! No more "we got hacked because we were running 5 year old unpatched software." More on this in the podcast ๐Ÿ‘‡

07.04.2025 14:11 โ€” ๐Ÿ‘ 8    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
cargo-semver-checks with Predrag Gruevski Cargo Semver Checks is a Rust tool by Predrag Gruevski that is tackling the problem of broken dependencies that cost developers time when trying to upgrade dependencies. Predragโ€™s work shows how autom...

This episode of #OpenSourceSecurity talks to @predr.ag about cargo-semver-checks

it's a #Rust tool that can help you figure out if you broke #semver

We also touch on the difficulty of detecting breaking changes, sustainable open source, and what's to come for semver checking

07.04.2025 13:37 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
Distributed CI and Git with Lars Wirzenius I got to chat with Lars about a new CI/CD system heโ€™s been working on called Ambient. It sounds really cool and does some very clever things today, with even more things planned in the future. We also...

I spoke with Lars Wirzenius on #OpenSourceSecurity about two really cool projects he's working on

Ambient is a distributed CI/CD system written in Rust

Radicle is a distributed Git Forge

It's a really fun chat and I learned a lot

opensourcesecurity.io/2025/2025-03...

31.03.2025 13:31 โ€” ๐Ÿ‘ 7    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Home - Hacker History Podcast Hacker History: Explore where it all began, interviews with retro hackers, the pioneers and forefathers of yesteryear. The true old school hackers amongst our societies have an unquenchable thirst for...

You should totally tell your story on the @cyphercon.bsky.social hacker history podcast!

hackerhistory.com

Iโ€™ll hook you up with some contact info at the show

30.03.2025 22:48 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@josh.bressers.name is following 20 prominent accounts