
Today, software is built and delivered faster than ever, but that speed has come with a cost. The integrity of the software supply chain is now one of the most actively targeted areas in cyber security. High-impact incidents in recent years have shown how quickly a single compromised dependency, build step, or update mechanism can cascade through an entire ecosystem.
OWASP addressed these shifts in 2021 by introducing A08: Software and Data Integrity Failures, a category focused on software tampering, unverified components, and weaknesses in code and delivery pipelines.
Even with a new OWASP Top 10 on the horizon, A08 still remains highly relevant.
Attacks against the software supply chain often succeed not only because of code flaws, but also because of the underlying trust in components and pipelines. As organisations lean more heavily on open-source dependencies and automated CI/CD tooling, that foundation of trust is becoming increasingly difficult to protect.
OWASP A08:2021 brings attention to an important application security principle that software is only as trustworthy as the code, components, and processes that produce it. When those elements can be tampered with (or aren’t verified properly) you end up with what OWASP calls Software and Data Integrity Failures.
The category covers a broad range of scenarios:
You’ll notice many of these weaknesses have little to do with traditional coding flaws and far more to do with the systems that assemble, deploy, and update software.
Read More: From OWASP to NZISM: Navigating Security Standards in New Zealand
Modern software is rarely built from scratch. Most applications now rely on a sprawling network of open-source libraries, container images, build tools, and automation scripts. These components are pulled into development pipelines automatically and at speed, which means many teams have limited visibility into what they’re actually shipping.
If you’ve ever added a new dependency with a single command and assumed it was safe, you should now understand how easily supply chain risk can slip through.
The sheer number of components involved is part of the problem. A standard application can include hundreds of direct dependencies and thousands more transitive ones. Each of these carries its own vulnerabilities, maintainers, and supply chain exposures.
Attackers understand this better than anyone. By compromising a single library, registry, or build configuration, they can quietly reach every environment downstream.
NIST’s supply chain guidance Special Publication 800-161r1 “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations” reinforces this point. Without transparency, provenance, and integrity checks, organisations are effectively trusting every component in the chain by default.
Integrity failures often stem from security gaps in the way software is assembled, updated, and deployed. These issues rarely resemble traditional software vulnerabilities. Instead, they’re offshoots of the assumptions teams make about their components and automation.
Common root causes include:
When you look at them side by side, it’s clear they all point to the same problem: too much trust built into the software delivery chain.
Read More: OWASP Top 10 LLM Risks and Their Impact on Businesses
Reducing the likelihood of A08 failures requires a combination of technical controls and stronger assurance around how software is built and updated.
Practical controls include the following:
A key part of addressing A08 is having reliable visibility into the components, dependencies, and artefacts that flow through a software delivery chain. Blacklock helps organisations establish this assurance through a set of capabilities designed to uncover integrity risks early and verify remediation consistently.
Blacklock’s SBOM Scanning service gives organisations a clear view of the libraries and dependencies inside their applications. By analysing SBOMs (Software Bill of Materials) against known vulnerabilities, licensing issues, and outdated packages, teams can quickly see where supply chain risk may enter the build process. This aligns directly with A08’s focus on untrusted and unverified components.
Blacklock integrates with CI/CD pipelines and automated workflows, enabling Dynamic Application Security Testing (DAST) scans to run whenever teams trigger them as part of their build or release process. This keeps visibility current and avoids reliance on manual, infrequent checks, which is one of the root causes of A08 failures.
When teams update a vulnerable component, they can use Blacklock’s Agentic AI-powered Automated Security Validation re-tests to confirm the issue has been fully resolved. This provides a reliable closure loop, ensuring that fixes have the intended effect before they reach production.
If you’re looking to improve visibility into your software components and build pipelines, reduce supply chain risk, or understand how Blacklock can support your A08 mitigation efforts, our team is here to help. We work with organisations across New Zealand and Australia to build practical, evidence-based security assurance into their delivery pipelines. Contact us now.
Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!
