Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management

📅 2025-03-30
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing automated tools for open-source software (OSS) security vulnerability remediation support only limited strategies (e.g., version downgrades, patch application), despite practitioners employing a far richer and more diverse set of repair practices—yet no systematic empirical study has characterized this landscape. Method: We conducted a large-scale empirical study of 21,187 real-world security issues from GitHub, constructing the first hierarchical taxonomy of 44 repair strategies (RTs) via mixed-method analysis—including data mining, qualitative coding, and dual-dimensional evaluation (effectiveness and cost). Contribution/Results: Our findings reveal critical gaps: 44% of high-frequency strategies (e.g., dependency replacement, path-based mitigation) are unsupported by mainstream tools; 54% of CVE entries lack actionable remediation guidance. Crucially, 93% of security issues contain explicit, implementable fixes. This work delivers the first empirically grounded classification framework to guide automated tool enhancement and vulnerability database enrichment.

Technology Category

Application Category

📝 Abstract
In the rapidly evolving landscape of software development, addressing security vulnerabilities in open-source software (OSS) has become critically important. However, existing research and tools from both academia and industry mainly relied on limited solutions, such as vulnerable version adjustment and adopting patches, to handle identified vulnerabilities. However, far more flexible and diverse countermeasures have been actively adopted in the open-source communities. A holistic empirical study is needed to explore the prevalence, distribution, preferences, and effectiveness of these diverse strategies. To this end, in this paper, we conduct a comprehensive study on the taxonomy of vulnerability remediation tactics (RT) in OSS projects and investigate their pros and cons. This study addresses this oversight by conducting a comprehensive empirical analysis of 21,187 issues from GitHub, aiming to understand the range and efficacy of remediation tactics within the OSS community. We developed a hierarchical taxonomy of 44 distinct RT and evaluated their effectiveness and costs. Our findings highlight a significant reliance on community-driven strategies, like using alternative libraries and bypassing vulnerabilities, 44% of which are currently unsupported by cutting-edge tools. Additionally, this research exposes the community's preferences for certain fixing approaches by analyzing their acceptance and the reasons for rejection. It also underscores a critical gap in modern vulnerability databases, where 54% of CVEs lack fixing suggestions, a gap that can be significantly mitigated by leveraging the 93% of actionable solutions provided through GitHub issues.
Problem

Research questions and friction points this paper is trying to address.

Exploring diverse security vulnerability remediation tactics in open-source software
Assessing effectiveness and community preferences for 44 distinct fixing strategies
Addressing gaps in vulnerability databases with actionable GitHub issue solutions
Innovation

Methods, ideas, or system contributions that make the work stand out.

Hierarchical taxonomy of 44 remediation tactics
Empirical analysis of 21,187 GitHub issues
Community-driven strategies bypassing vulnerabilities
🔎 Similar Papers
No similar papers found.
Lyuye Zhang
Lyuye Zhang
Postdoc, Nanyang Technological University
Program AnalysisOpen sourceOpen source securitySoftware supply chainSoftware maintenace
J
Jiahui Wu
Nanyang Technological University, Singapore
Chengwei Liu
Chengwei Liu
Research Assistant Professor, Nanyang Technological University
Open Source SecuritySoftware Supply Chain SecurityProgram AnalysisSoftware Maintenance
K
Kaixuan Li
East China Normal University, China
X
Xiaoyu Sun
The School of Computing, Australian National University, Australia
Lida Zhao
Lida Zhao
Nanyang Technological University
Software Composition AnalysisLLM security
C
Chong Wang
Nanyang Technological University, Singapore
Y
Yang Liu
Nanyang Technological University, Singapore