Products

Problems
we solve

We can help your business

Request a Free Demo / trial

Insights

Insights | Application Security | Open source
3 December, 2022

How Secure Are Open Source Test Tools?

There’s a polarisation of opinion amongst test tool users – it boils down to where you stand on the following question: Open source v paid tools.

In this debate, there’s one area that I don’t think gets enough attention, application security.

Even when it is discussed, I often hear the open-source champions casually proclaim that “Open source tools are not necessarily more prone to hacks than proprietary test tools.” 

Sure, it’s easy to make claims like this. But can it really be true? 

In this blog, I ask. How secure are open source test tools? I highlight 4 areas where open source security should give you cause for concern.

1. Open Source Code Doesn’t Always Have a Security Review

As a test professional, you know that even the best developers have defects in their code. These defects range from easily detected functional issues, though more complex performance issues, to deeply buried security vulnerabilities.

The fact is, it’s hard, if not impossible, to develop flawless code. All software needs to be tested thoroughly prior to release, and this includes security testing. Most developers aren’t experts in writing secure code, it’s way down on their list of priorities. 

2. Open Source Relies Heavily on Third Party Libraries

Open Source software often pulls in third-party libraries that are then used in blind faith. We should give the original developers the benefit of the doubt. I’m sure they initially vetted the libraries that were used and implemented any fixes required during the development.

However, once open source software goes live, it is increasingly difficult to ensure that all libraries are known and patched appropriately.

3. Bad Actors Have Visibility of Open Source Code Too

Open Source proponents like to counter the issues above, by pointing out that their code is widely used and constantly scrutinised by many developers. Their argument is that this increases the likelihood of security flaws being caught and squashed. And that is partially true. At least, they’re likely to fix them eventually. But what happens in the meantime?

Open Source projects have development communities, these are the people who contribute to the development of the solution.

When a potential vulnerability is detected, the members of the development community are notified– By its very nature, this is before the vulnerabilities are fixed.

Unfortunately, not all development community members have the best intentions in mind – some of them could be cybercriminals.

These notifications mean they don’t even have to do any homework. They can immediately pounce on anyone running old versions. In fact, criminals can often access the vulnerabilities even after fixes have been implemented in the source code. After all, not all companies deploy fixes immediately.

4. Open Source Add-Ons Add Additional Security Complications

Even if we disregard the issues associated with the main open source solution – which we absolutely shouldn’t do – there’s still a huge elephant in the room. Most open source users rely on add-ons.

These add-ons are also open source tools and are therefore subject to all of the same issues faced by the software they are adding to.

Conclusion

In my opinion, it is undeniable that open source test tools carry significant security risks.

On the surface, I find it odd that some financial institutions, usually risk-averse, appear happy to use open source tools.

However, when I think about this more deeply, I wonder if those controlling the purse strings know how to assess and understand open source’s risk and true cost.

These are risks can that you can avoid by using the right paid tools.

Tools like the Micro Focus suite get external security validation done. They automatically validate every line of code and release regular and consistent patches. They will, for most, prove cheaper in the long run.

Learn about these tools – Contact us today!

Subscribe to testing times

Stephen Davis
by Stephen Davis

Stephen Davis is the founder of Calleo Software, a OpenText (formerly Micro Focus) Gold Partner. His passion is to help test professionals improve the efficiency and effectiveness of software testing.

To view Stephen's LinkedIn profile and connect 

Stephen Davis LinkedIn profile

3rd December 2022
2025 top testing articles

2025 Roundup: Check Out The Top 5 Testing Times Articles

Thanks to your support, 2025 was another excellent year for Testing Times and our 10,000+ subscribers. We explored a wide range of software testing topics, including test automation, performance testing, Jira fatigue, tester authority, and more. Below is a quick look at the five newsletters with the most reactions this year, and why they resonated so strongly.

Is WFH worth the risk

Remote Testing: Is Working From Home Worth The Risk?

Increasingly, organisations expect remote and hybrid testers to use borrowed tool licences, unstable VPNs, and software never designed to leave the office. That creates significant compliance and security risks that can turn into serious long‑term problems. It’s not the testers per se, but remote execution over on‑prem licences is a software audit waiting to happen. Read on to learn why a compliance nightmare isn’t the only reason your test setup might not be fit for distributed and home‑working team members.

Effortless automation

Solved: 4 Common Test Automation Headaches

Software teams know the story all too well: automation promises speed and reliability, but reality often brings fragile scripts, phantom failures, and endless rework. In the end, the technology intended to accelerate releases ends up bogging things down. Or at least, that’s how things used to be… Today’s AI-powered functional

Test the Untestable

Test the Untestable: Unlock Savings & Accelerate Your Project

Testers have long been asked to test earlier, faster, and more often. In truth, however, when critical APIs, integrations, or microservices aren’t ready, testing gets stuck. We’ve all been there, raring to go, like greyhounds in the slips…  but with nothing to test, and increasingly concerned about the impending last-minute panic.

The Test Tools You Need

Testers: Will We Finally Get The Tools We Need?

During the 2008 credit crunch, companies slashed technical investment. The mantra “do more with less” stuck—and 17 years later, testers are still paying the price as demands, complexity, and expectations have soared. It’s no coincidence that we’re witnessing an increasing number of high-profile software failures and cyber attacks. Yet, there’s still little willingness to invest in the right test tools and training.

Test Automation Fails Smaller Teams

Why Test Automation Fails for Smaller Teams

Many small software teams turn to test automation, expecting substantial time and cost savings. However, they often fail to achieve any of these goals; instead of seeing a return on investment, they end up spending more effort and cost fixing their automation packs. This failure can leave lasting scars, deterring people from embracing automation and realising its many benefits…

breaking up with legacy tools

When to Move on From Legacy Test Tools

I often speak to people who want to abandon legacy test tools and transition to shiny new solutions. They cite several reasons for the switch, many of which are valid, while others need greater consideration to avoid a negative or costly outcome. On the other hand, I also speak to people who are reluctant to ever change tools, even though they’d see incredible benefits.

Shift Left

Shift Left Testing: 4 Myths and Why They Matter

Shift-left testing has become one of the most talked-about software development ideas. It sounds deceptively simple: test earlier in the process to avoid late surprises. But while the phrase is repeated at countless conferences and stand-ups, it is often misunderstood, misapplied, or reduced to a box-ticking activity (like many other testing initiatives).

Is speed destroying quality

Are Faster Releases Destroying Software Quality?

The relentless obsession with ever-faster software delivery puts increased pressure on projects and teams, forcing them to adopt new processes and behaviours, but at what cost? The need for speed has transformed release frequency into a core metric, but is this relentless pursuit of speed undermining quality?

AI in software testing

AI in Software Testing: Just Another Fad?

AI is everywhere. The software testing industry is flooded with buzzword-heavy solutions, and you’d be hard pressed to find a vendor that hasn’t marked at least one of their tools as AI-powered. But is AI another in a long list of cautionary tales, or does it genuinely herald a new era?

Insights

Search

Related Articles

To get other software testing insights, like this, direct to you inbox join the Calleo mailing list.

You can, of course, unsubscribe 

at any time!

By signing up you consent to receiving regular emails from Calleo with updates, tips and ideas on software testing along with the occasional promotion for software testing products. You can, of course, unsubscribe at any time. Click here for the privacy policy.

Sign up to receive the latest, Software Testing Insights, news and to join the Calleo mailing list.

You can, of course, unsubscribe at any time!

By signing up you consent to receiving regular emails from Calleo with updates, tips and ideas on software testing along with the occasional promotion for software testing products. You can, of course, unsubscribe at any time. Click here for the privacy policy.