Owasp Vulnerable Components
Every third-party dependency must be inventoried (SBOM), continuously scanned for known CVEs, and updated within 30 days for critical/high vulnerabilities.…
$ prime install @community/principle-owasp-vulnerable-components Projection
Always in _index.xml · the agent never has to ask for this.
OwaspVulnerableComponents [principle] v1.0.0
OWASP Top 10 A06:2021 (formerly Using Components with Known Vulnerabilities) — components such as libraries, frameworks, and runtimes run with the same privileges as the application. If a vulnerable component is exploited, it can facilitate data loss or server takeover.
Every third-party dependency must be inventoried (SBOM), continuously scanned for known CVEs, and updated within 30 days for critical/high vulnerabilities. Applications must never deploy with components that have reached end-of-life without a documented compensating control.
Loaded when retrieval picks the atom as adjacent / supporting.
OwaspVulnerableComponents [principle] v1.0.0
OWASP Top 10 A06:2021 (formerly Using Components with Known Vulnerabilities) — components such as libraries, frameworks, and runtimes run with the same privileges as the application. If a vulnerable component is exploited, it can facilitate data loss or server takeover.
Every third-party dependency must be inventoried (SBOM), continuously scanned for known CVEs, and updated within 30 days for critical/high vulnerabilities. Applications must never deploy with components that have reached end-of-life without a documented compensating control.
Attributed To
OWASP Foundation, Top 10 2021
Applies To
- npm/yarn/pnpm package.json dependencies and transitive deps
- pip/poetry/conda Python package dependencies
- Maven/Gradle Java dependencies
- Docker base images and OS packages inside containers
- Infrastructure software (nginx, OpenSSL, OpenSSH versions)
- Runtime platforms (Node.js LTS, JVM, .NET, Python end-of-life versions)
Counter Examples
- Equifax 2017: Apache Struts 2 CVE-2017-5638 was patched March 7; Equifax's scan on March 15 missed the vulnerable component; breach detected July 29 — 2 months of unpatched exposure.
- node_modules with 1,847 direct+transitive deps, no lockfile audit, no Dependabot —
npm auditreveals 12 high-severity CVEs present for 18+ months. - Production Docker image based on
ubuntu:18.04(EOL April 2023) with unpatched OpenSSL 1.1.1 — multiple known CVEs, no patching mechanism in place.
Loaded when retrieval picks the atom as a focal / direct hit.
OwaspVulnerableComponents [principle] v1.0.0
OWASP Top 10 A06:2021 (formerly Using Components with Known Vulnerabilities) — components such as libraries, frameworks, and runtimes run with the same privileges as the application. If a vulnerable component is exploited, it can facilitate data loss or server takeover.
Every third-party dependency must be inventoried (SBOM), continuously scanned for known CVEs, and updated within 30 days for critical/high vulnerabilities. Applications must never deploy with components that have reached end-of-life without a documented compensating control.
Attributed To
OWASP Foundation, Top 10 2021
Applies To
- npm/yarn/pnpm package.json dependencies and transitive deps
- pip/poetry/conda Python package dependencies
- Maven/Gradle Java dependencies
- Docker base images and OS packages inside containers
- Infrastructure software (nginx, OpenSSL, OpenSSH versions)
- Runtime platforms (Node.js LTS, JVM, .NET, Python end-of-life versions)
Counter Examples
- Equifax 2017: Apache Struts 2 CVE-2017-5638 was patched March 7; Equifax's scan on March 15 missed the vulnerable component; breach detected July 29 — 2 months of unpatched exposure.
- node_modules with 1,847 direct+transitive deps, no lockfile audit, no Dependabot —
npm auditreveals 12 high-severity CVEs present for 18+ months. - Production Docker image based on
ubuntu:18.04(EOL April 2023) with unpatched OpenSSL 1.1.1 — multiple known CVEs, no patching mechanism in place.
Sources
Examples
- GitHub Dependabot: automatically opens PRs to update vulnerable dependencies within hours of CVE publication — merged automatically for patch-level updates with passing tests.
- Snyk: generates a license-compliant SBOM and blocks CI builds when CVSS ≥ 9.0 vulnerabilities are introduced — integrated with GitHub PR checks.
- Docker Scout (docker scout cves): scans image layers against CVE databases at build time; fails pipeline if critical CVEs present in base image.
- Socket.dev: detects supply-chain attacks (typosquatting, dependency confusion) in npm/PyPI before install — catches malicious packages before they enter the codebase.
Source
- https://owasp.org/Top10/A06_2021-Vulnerable_and_Outdated_Components/
- CVE-2021-44228 (Log4Shell, CVSS 10.0): log4j 2.x — 35,000+ packages on Maven Central were transitively affected.
- CVE-2017-5638 (Apache Struts): Equifax breach — 147M records; a patch had been available for 2 months before exploitation.
Source
prime-system/examples/frontend-design/primes/compiled/@community/principle-owasp-vulnerable-components/atom.yaml