Products

Problems
we solve

We can help your business

Request a Free Demo / trial

Insights

Insights | Application Security | Open source
3 December, 2022

How Secure Are Open Source Test Tools?

There’s a polarisation of opinion amongst test tool users – it boils down to where you stand on the following question: Open source v paid tools.

In this debate, there’s one area that I don’t think gets enough attention, application security.

Even when it is discussed, I often hear the open-source champions casually proclaim that “Open source tools are not necessarily more prone to hacks than proprietary test tools.” 

Sure, it’s easy to make claims like this. But can it really be true? 

In this blog, I ask. How secure are open source test tools? I highlight 4 areas where open source security should give you cause for concern.

1. Open Source Code Doesn’t Always Have a Security Review

As a test professional, you know that even the best developers have defects in their code. These defects range from easily detected functional issues, though more complex performance issues, to deeply buried security vulnerabilities.

The fact is, it’s hard, if not impossible, to develop flawless code. All software needs to be tested thoroughly prior to release, and this includes security testing. Most developers aren’t experts in writing secure code, it’s way down on their list of priorities. 

2. Open Source Relies Heavily on Third Party Libraries

Open Source software often pulls in third-party libraries that are then used in blind faith. We should give the original developers the benefit of the doubt. I’m sure they initially vetted the libraries that were used and implemented any fixes required during the development.

However, once open source software goes live, it is increasingly difficult to ensure that all libraries are known and patched appropriately.

3. Bad Actors Have Visibility of Open Source Code Too

Open Source proponents like to counter the issues above, by pointing out that their code is widely used and constantly scrutinised by many developers. Their argument is that this increases the likelihood of security flaws being caught and squashed. And that is partially true. At least, they’re likely to fix them eventually. But what happens in the meantime?

Open Source projects have development communities, these are the people who contribute to the development of the solution.

When a potential vulnerability is detected, the members of the development community are notified– By its very nature, this is before the vulnerabilities are fixed.

Unfortunately, not all development community members have the best intentions in mind – some of them could be cybercriminals.

These notifications mean they don’t even have to do any homework. They can immediately pounce on anyone running old versions. In fact, criminals can often access the vulnerabilities even after fixes have been implemented in the source code. After all, not all companies deploy fixes immediately.

4. Open Source Add-Ons Add Additional Security Complications

Even if we disregard the issues associated with the main open source solution – which we absolutely shouldn’t do – there’s still a huge elephant in the room. Most open source users rely on add-ons.

These add-ons are also open source tools and are therefore subject to all of the same issues faced by the software they are adding to.

Conclusion

In my opinion, it is undeniable that open source test tools carry significant security risks.

On the surface, I find it odd that some financial institutions, usually risk-averse, appear happy to use open source tools.

However, when I think about this more deeply, I wonder if those controlling the purse strings know how to assess and understand open source’s risk and true cost.

These are risks can that you can avoid by using the right paid tools.

Tools like the Micro Focus suite get external security validation done. They automatically validate every line of code and release regular and consistent patches. They will, for most, prove cheaper in the long run.

Learn about these tools – Contact us today!

Subscribe to testing times

Stephen Davis
by Stephen Davis

Stephen Davis is the founder of Calleo Software, a OpenText (formerly Micro Focus) Gold Partner. His passion is to help test professionals improve the efficiency and effectiveness of software testing.

To view Stephen's LinkedIn profile and connect 

Stephen Davis LinkedIn profile

3rd December 2022
LoadRunner AI

LoadRunner 26.1: A New Direction in Performance Testing?

OpenText’s version 26.1 is a clear statement of where the Performance Engineering (LoadRunner) family is heading: AI-assisted, simplifying complex tasks and enabling your team to be more productive. This creates a very practical question: how do you buy and deploy these new capabilities in a way that actually moves the needle on risk, cost, and delivery speed?

Hooked on Open Source

Revealed: How Consultancies Get You Hooked on Bad Tools

Picture the scene: you’re about to engage a consultancy for testing services, and their proposal leans heavily on open‑source tools, but there’s a nagging doubt… a misalignment between what you’re paying for and what they’re delivering.

You want the guidance and support to prevent costly mistakes; they want more billable days.

Calleo Sell Test Tools

Calleo: We Sell Test Tools

With Calleo, you get expert guidance to find the right options, demos and trial licenses to evaluate them, and practical help to get up and running. You’ll see the pros, cons and long-term costs clearly before making any decisions, and stay supported with renewals and updates long after you’ve started using the tool.

cut test maintenance

4 Ways to Cut Test Maintenance Effort with AI

Automation maintenance is a pain. It’s a frustrating time drain that nobody enjoys. Unfortunately, teams are doing more of it than ever, with modern solutions changing like the wind and each new release jeopardising script integrity. Thankfully, AI-driven automation is here to help.

2025 top testing articles

2025 Roundup: Check Out The Top 5 Testing Times Articles

Thanks to your support, 2025 was another excellent year for Testing Times and our 10,000+ subscribers. We explored a wide range of software testing topics, including test automation, performance testing, Jira fatigue, tester authority, and more. Below is a quick look at the five newsletters with the most reactions this year, and why they resonated so strongly.

Is WFH worth the risk

Remote Testing: Is Working From Home Worth The Risk?

Increasingly, organisations expect remote and hybrid testers to use borrowed tool licences, unstable VPNs, and software never designed to leave the office. That creates significant compliance and security risks that can turn into serious long‑term problems. It’s not the testers per se, but remote execution over on‑prem licences is a software audit waiting to happen. Read on to learn why a compliance nightmare isn’t the only reason your test setup might not be fit for distributed and home‑working team members.

Effortless automation

Solved: 4 Common Test Automation Headaches

Software teams know the story all too well: automation promises speed and reliability, but reality often brings fragile scripts, phantom failures, and endless rework. In the end, the technology intended to accelerate releases ends up bogging things down. Or at least, that’s how things used to be… Today’s AI-powered functional

Test the Untestable

Test the Untestable: Unlock Savings & Accelerate Your Project

Testers have long been asked to test earlier, faster, and more often. In truth, however, when critical APIs, integrations, or microservices aren’t ready, testing gets stuck. We’ve all been there, raring to go, like greyhounds in the slips…  but with nothing to test, and increasingly concerned about the impending last-minute panic.

The Test Tools You Need

Testers: Will We Finally Get The Tools We Need?

During the 2008 credit crunch, companies slashed technical investment. The mantra “do more with less” stuck—and 17 years later, testers are still paying the price as demands, complexity, and expectations have soared. It’s no coincidence that we’re witnessing an increasing number of high-profile software failures and cyber attacks. Yet, there’s still little willingness to invest in the right test tools and training.

Insights

Search

Related Articles

To get other software testing insights, like this, direct to you inbox join the Calleo mailing list.

You can, of course, unsubscribe 

at any time!

By signing up you consent to receiving regular emails from Calleo with updates, tips and ideas on software testing along with the occasional promotion for software testing products. You can, of course, unsubscribe at any time. Click here for the privacy policy.

Sign up to receive the latest, Software Testing Insights, news and to join the Calleo mailing list.

You can, of course, unsubscribe at any time!

By signing up you consent to receiving regular emails from Calleo with updates, tips and ideas on software testing along with the occasional promotion for software testing products. You can, of course, unsubscribe at any time. Click here for the privacy policy.