{"id":9329,"date":"2023-03-30T08:44:00","date_gmt":"2023-03-30T12:44:00","guid":{"rendered":"https:\/\/nventive.com\/articles\/a-safe-use-for-open-source-code-in-custom-development\/"},"modified":"2025-05-27T22:33:47","modified_gmt":"2025-05-28T02:33:47","slug":"a-safe-use-for-open-source-code-in-custom-development","status":"publish","type":"post","link":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/","title":{"rendered":"A Safe Use for Open-Source Code in Custom Development"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9329\" class=\"elementor elementor-9329 elementor-7099\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c5f234 e-flex e-con-boxed e-con e-parent\" data-id=\"1c5f234\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82cfcf7 elementor-widget elementor-widget-text-editor\" data-id=\"82cfcf7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defined as being developed to be accessible for the public, an open-source project can be seen, modified, used, and distributed at the convenience of its group of owners. For each development project across the world, open-source code is a precious tool for the community of developers. Still, any use of open source must be done safely, in respect of development, security, and operation (DevSecOps) practices.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c46f17 e-flex e-con-boxed e-con e-parent\" data-id=\"4c46f17\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8788702 elementor-widget elementor-widget-text-editor\" data-id=\"8788702\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To better understand what an open-source project is, just imagine a list of your favourite songs you could create on one of the many music-streaming platforms available. You listen to this playlist during the evening\u2026<\/p>\n<p>    Everyone can listen to it (use it);<br \/>\n    The list is accessible, and anyone can subscribe to it (see it);<br \/>\n    A friend named Johnny is fan of an unknown band, and suggests adding one of their songs to the playlist (modify it);<br \/>\n    Another friend, Camilla, asks if she can listen to the playlist during her next party (distribute it).<\/p>\n<p>Because it is developed in a collaborative manner, using open-source code in digital projects attests to a strong community spirit. The open-source code\u2019s quality relies on certain key principles:<\/p>\n<p>    Continuous contributions: developers not only help themselves to open-source code. Every day, they work on available projects and make these projects available to all.<br \/>\n    Peer validation and review: open-source projects can always be improved and are supported by each developer\u2019s contributions, verifications, and optimizations.<br \/>\n    Autonomy and trust: the elements available in open-source code are reliable and already tested daily. These are no dependencies with a self-interested company; projects rely on transparency principles. The community is self-sufficient and can make technological development progress every day.<\/p>\n<p>The largest open-source community lives on GitHub, a platform known for the quality of its contributors and for its number of contributions. True bonds are created daily between the contributors throughout virtual discussions or in-person meetings at key events.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1b476a e-flex e-con-boxed e-con e-parent\" data-id=\"c1b476a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54c5fb41 elementor-widget elementor-widget-image\" data-id=\"54c5fb41\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1482\" height=\"834\" src=\"https:\/\/nventive.com\/app\/uploads\/safety-exploitation-development-devsecops.webp\" class=\"attachment-full size-full wp-image-7114\" alt=\"Development, security, and operations (devsecops)\" srcset=\"https:\/\/nventive.com\/app\/uploads\/safety-exploitation-development-devsecops.webp 1482w, https:\/\/nventive.com\/app\/uploads\/safety-exploitation-development-devsecops-300x169.webp 300w, https:\/\/nventive.com\/app\/uploads\/safety-exploitation-development-devsecops-1024x576.webp 1024w, https:\/\/nventive.com\/app\/uploads\/safety-exploitation-development-devsecops-768x432.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d99717a e-flex e-con-boxed e-con e-parent\" data-id=\"d99717a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d15a30a elementor-widget elementor-widget-heading\" data-id=\"d15a30a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The DevSecOps Approach for a Thoughtful and Safe Use<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-183b462 elementor-widget elementor-widget-text-editor\" data-id=\"183b462\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"blog-textstyled__StyledBlogTextContainer-sc-191dd4d-0 fNnIHR\">\n<div class=\"blog-textstyled__StyledBlogTextWrapper-sc-191dd4d-1 DGLwj\">\n<div class=\"blog-textstyled__StyledTextWrapper-sc-191dd4d-2 gKtLpu\">\n<div class=\"blog-textstyled__StyledText-sc-191dd4d-4 dHIQYz\">\n<p>Open-source software is exposed to the same risks as the apps developed by companies, and often, company solutions use open-source dependencies.<\/p>\n<p>That\u2019s why we use the DevSecOps approach, which can mitigate these risks as soon as possible.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-602e6de e-flex e-con-boxed e-con e-parent\" data-id=\"602e6de\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61632d7 elementor-widget elementor-widget-heading\" data-id=\"61632d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verifying the Public Licence<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b8d30 elementor-widget elementor-widget-text-editor\" data-id=\"82b8d30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before using any open-source project, our experts analyze its source, its number of contributions, and the activity of the contributors\u2019 group \u2013 since most packages are created by several people.<\/p>\n<p>When code is available in open source, it is crucial that a public licence and its type be attached to it. This licence is accessible in a file placed in the project\u2019s root folder. It allows us to identify the project\u2019s source. But it also enables law compliance: indeed, without a licence, the code is copyright-protected by default. Any ill-intended author could contest the use of their open-source code and would have the law on their side.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bae01db e-flex e-con-boxed e-con e-parent\" data-id=\"bae01db\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef2aaaf elementor-widget elementor-widget-heading\" data-id=\"ef2aaaf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Project Update Review<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5157180 elementor-widget elementor-widget-text-editor\" data-id=\"5157180\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Some contributors abandon their projects. A project that isn\u2019t updated has more risks of containing vulnerabilities and obsolete libraries.<\/p>\n<p>GitHub\u2019s Dependabot tool can update some of the project\u2019s components if it is configurated with a code repository. Before using an open-source project, we must check the last time it was updated or verify if there are any vulnerabilities associated with the project.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7144c5 e-flex e-con-boxed e-con e-parent\" data-id=\"c7144c5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fb98dc elementor-widget elementor-widget-heading\" data-id=\"7fb98dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consulting the OWASP Top 10<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cdcf38 elementor-widget elementor-widget-text-editor\" data-id=\"7cdcf38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The\u00a0<a href=\"https:\/\/owasp.org\/Top10\/\">OWASP Top 10<\/a>\u00a0(Open Web Application Security Project) is the benchmark in cybersecurity. This ranking compiles data on the most exploited vulnerabilities in systems: it is important that each developer know about these risks to identify and correct them.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-513232fd e-flex e-con-boxed e-con e-parent\" data-id=\"513232fd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4170e799 elementor-widget elementor-widget-image\" data-id=\"4170e799\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1482\" height=\"834\" src=\"https:\/\/nventive.com\/app\/uploads\/automate-open-source-project.webp\" class=\"attachment-full size-full wp-image-7116\" alt=\"Automate open source projects\" srcset=\"https:\/\/nventive.com\/app\/uploads\/automate-open-source-project.webp 1482w, https:\/\/nventive.com\/app\/uploads\/automate-open-source-project-300x169.webp 300w, https:\/\/nventive.com\/app\/uploads\/automate-open-source-project-1024x576.webp 1024w, https:\/\/nventive.com\/app\/uploads\/automate-open-source-project-768x432.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a83ab9 e-flex e-con-boxed e-con e-parent\" data-id=\"7a83ab9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5d028e elementor-widget elementor-widget-heading\" data-id=\"c5d028e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automating Open-Source Projects<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2154fb3 elementor-widget elementor-widget-text-editor\" data-id=\"2154fb3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is recommended to automate your project as much as possible: automatic build, automatic tests, security scans, licence scans, deployments, hash code reviews\u2026 You have to trust automations while also performing continuous verifications. Indeed, wrongly configurating one of these elements could cause an attack on the supply chain or a water hole attack.<\/p>\n<p>With our DevSecOps practices at nventive, we use the Snyk tool. It allows developers to scan the source code, the dependencies, the containers, and the infrastructure as code (IaC) to find and fix these vulnerabilities as quickly as possible.<\/p>\n<p>The peer-review process to approve the use of open-source code also strengthens the use of these open-source projects.<\/p>\n<p>Of course, automation only makes sense if we rapidly deploy the vulnerability fix.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3752ada e-con-full e-flex e-con e-parent\" data-id=\"3752ada\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30995704 elementor-widget elementor-widget-testimonial\" data-id=\"30995704\" data-element_type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\"><p><span class=\"blog-quote-textstyled__StyledQuoteOpen-sc-9ayjhr-3 cfwbLi\">\"<\/span>Build and deployment automation is crucial for security, and not only for the development of new features.\"<\/p>\n<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Mathieu Fillion<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Development Team Manager<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59d69db e-flex e-con-boxed e-con e-parent\" data-id=\"59d69db\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7334a53 elementor-widget elementor-widget-heading\" data-id=\"7334a53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Many Benefits of Open Source<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a17f6f1 elementor-widget elementor-widget-text-editor\" data-id=\"a17f6f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"blog-textstyled__StyledBlogTextContainer-sc-191dd4d-0 fNnIHR\">\n<div class=\"blog-textstyled__StyledBlogTextWrapper-sc-191dd4d-1 DGLwj\">\n<div class=\"blog-textstyled__StyledTextWrapper-sc-191dd4d-2 gKtLpu\">\n<div class=\"blog-textstyled__StyledText-sc-191dd4d-4 dHIQYz\">\n<p>Using open-source code projects has two main advantages: first, it represents an important productivity gain for each developer. Second, since the quality has already been reviewed and passed the test, it gives us a viable solution that saves time and that increases the quality level from one project to another.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-944e3ee e-con-full e-flex e-con e-parent\" data-id=\"944e3ee\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8392c5 elementor-widget elementor-widget-template\" data-id=\"b8392c5\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"12208\" class=\"elementor elementor-12208 elementor-12184\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d5957e e-flex e-con-boxed e-con e-parent\" data-id=\"40d5957e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b78efbf e-con-full e-flex e-con e-child\" data-id=\"1b78efbf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e14a4ef elementor-widget elementor-widget-heading\" data-id=\"7e14a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Featured articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2902db16 elementor-widget elementor-widget-nv-button\" data-id=\"2902db16\" data-element_type=\"widget\" data-widget_type=\"nv-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                <a\n            class=\"nv-button  nv-button--style--desktop--outline-icon nv-button--style--laptop--outline-icon nv-button--style--tablet--outline-icon nv-button--style--mobile--outline-icon nv-button--theme--desktop--dark nv-button--theme--laptop--dark nv-button--theme--tablet--dark nv-button--theme--mobile--dark\" href=\"https:\/\/nventive.com\/fr\/blogue\/\" aria-label=\"See more articles\"        >\n            <span class=\"nv-button__text\">See more articles<\/span>\n            <span class=\"nv-button__icon\">\n                <i aria-hidden=\"true\" class=\"myemoji-icon my-emoji-iconarrow_right_alt\"><\/i>            <\/span>\n        <\/a>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d033e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e3d033e\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:5334,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Defined as being developed to be accessible for the public, an open-source project can be seen, modified, used, and distributed at the convenience of its group of owners.<\/p>\n","protected":false},"author":3,"featured_media":7101,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[37],"tags":[65],"class_list":["post-9329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solutions-en","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Safe Use for Open-Source Code in Custom Development | nventive<\/title>\n<meta name=\"description\" content=\"Learn how to safely use open-source code in custom development projects, balancing innovation with security best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Safe Use for Open-Source Code in Custom Development | nventive\" \/>\n<meta property=\"og:description\" content=\"Learn how to safely use open-source code in custom development projects, balancing innovation with security best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\" \/>\n<meta property=\"og:site_name\" content=\"nventive\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-30T12:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"474\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"nventive\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nventive\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\"},\"author\":{\"name\":\"nventive\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379\"},\"headline\":\"A Safe Use for Open-Source Code in Custom Development\",\"datePublished\":\"2023-03-30T12:44:00+00:00\",\"dateModified\":\"2025-05-28T02:33:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\/\/nventive.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\",\"url\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\",\"name\":\"A Safe Use for Open-Source Code in Custom Development | nventive\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp\",\"datePublished\":\"2023-03-30T12:44:00+00:00\",\"dateModified\":\"2025-05-28T02:33:47+00:00\",\"description\":\"Learn how to safely use open-source code in custom development projects, balancing innovation with security best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage\",\"url\":\"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp\",\"contentUrl\":\"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp\",\"width\":842,\"height\":474,\"caption\":\"Safe use of open source in solution development\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/nventive.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Safe Use for Open-Source Code in Custom Development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nventive.com\/en\/#website\",\"url\":\"https:\/\/nventive.com\/en\/\",\"name\":\"nventive\",\"description\":\"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al\",\"publisher\":{\"@id\":\"https:\/\/nventive.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nventive.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nventive.com\/en\/#organization\",\"name\":\"nventive\",\"url\":\"https:\/\/nventive.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"nventive\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/nventive\/\",\"https:\/\/www.instagram.com\/hellonventive\/\",\"https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379\",\"name\":\"nventive\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g\",\"caption\":\"nventive\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Safe Use for Open-Source Code in Custom Development | nventive","description":"Learn how to safely use open-source code in custom development projects, balancing innovation with security best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/","og_locale":"en_US","og_type":"article","og_title":"A Safe Use for Open-Source Code in Custom Development | nventive","og_description":"Learn how to safely use open-source code in custom development projects, balancing innovation with security best practices.","og_url":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/","og_site_name":"nventive","article_published_time":"2023-03-30T12:44:00+00:00","article_modified_time":"2025-05-28T02:33:47+00:00","og_image":[{"width":842,"height":474,"url":"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp","type":"image\/webp"}],"author":"nventive","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nventive","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#article","isPartOf":{"@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/"},"author":{"name":"nventive","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379"},"headline":"A Safe Use for Open-Source Code in Custom Development","datePublished":"2023-03-30T12:44:00+00:00","dateModified":"2025-05-28T02:33:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/"},"wordCount":795,"publisher":{"@id":"https:\/\/nventive.com\/en\/#organization"},"image":{"@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp","keywords":["Cybersecurity"],"articleSection":["Solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/","url":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/","name":"A Safe Use for Open-Source Code in Custom Development | nventive","isPartOf":{"@id":"https:\/\/nventive.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage"},"image":{"@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp","datePublished":"2023-03-30T12:44:00+00:00","dateModified":"2025-05-28T02:33:47+00:00","description":"Learn how to safely use open-source code in custom development projects, balancing innovation with security best practices.","breadcrumb":{"@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#primaryimage","url":"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp","contentUrl":"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp","width":842,"height":474,"caption":"Safe use of open source in solution development"},{"@type":"BreadcrumbList","@id":"https:\/\/nventive.com\/en\/articles\/a-safe-use-for-open-source-code-in-custom-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/nventive.com\/en\/"},{"@type":"ListItem","position":2,"name":"A Safe Use for Open-Source Code in Custom Development"}]},{"@type":"WebSite","@id":"https:\/\/nventive.com\/en\/#website","url":"https:\/\/nventive.com\/en\/","name":"nventive","description":"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al","publisher":{"@id":"https:\/\/nventive.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nventive.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nventive.com\/en\/#organization","name":"nventive","url":"https:\/\/nventive.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"nventive"},"image":{"@id":"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/nventive\/","https:\/\/www.instagram.com\/hellonventive\/","https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w"]},{"@type":"Person","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379","name":"nventive","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g","caption":"nventive"}}]}},"jetpack_featured_media_url":"https:\/\/nventive.com\/app\/uploads\/safe-use-for-spen-source-code-in-custom-development.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/9329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/comments?post=9329"}],"version-history":[{"count":1,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/9329\/revisions"}],"predecessor-version":[{"id":15751,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/9329\/revisions\/15751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/media\/7101"}],"wp:attachment":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/media?parent=9329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/categories?post=9329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/tags?post=9329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}