Episode Transcript
How Did Russian-Maintained Code End Up in Pentagon Software?
Sep 3rd 2025
AI-generated, human-reviewed.
The U.S. Department of Defense is using open-source software maintained solely by a Russian-based Yandex employee, creating a potential national security vulnerability that highlights the fragility of modern software supply chains. This revelation, discussed on Security Now episode #1041, demonstrates how even the most security-conscious organizations remain vulnerable to supply chain attacks.
The fast-glob Security Dilemma
The software in question, fast-glob, helps developers search and organize project files efficiently. It's embedded in at least 30 pre-built software packages within the Department of Defense and is downloaded approximately 70 million times per week globally. The tool is used in over 5,000 projects worldwide, making it a critical piece of internet infrastructure.
On Security Now, Steve Gibson explained that the maintainer, Denis Malinochkin, appears to be acting in good faith and has maintained the project for over seven years. The code itself contains no known malicious elements and remains fully auditable as open-source software. However, the geopolitical reality creates an inherent risk that transcends individual intentions.
Why Single Maintainers Create Systemic Risk
According to Hayden Smith from Hunted Labs, who discovered this issue, "A project that is that popular should not be maintained by just one person." This isn't just about nationality or geopolitics—any critical software dependency with a single maintainer represents a significant vulnerability.
The risk multiplies when that maintainer works for Yandex, a major Russian technology company with documented ties to the Kremlin. As former NSA deputy director George Barnes noted on the topic, Russian law creates a framework where companies and individuals can be compelled to act on behalf of state interests, regardless of personal ethics or intentions.
The Pentagon's Flawed Vetting Process
Perhaps most concerning is that fast-glob is listed in Platform One's Iron Bank, described as the Pentagon's "vetted repository of software building blocks." This raises fundamental questions about what "vetted" actually means in practice.
Steve Gibson highlighted the contradiction: How can software be considered vetted when it's being updated at will by someone potentially subject to foreign state coercion? The DOD's Office of the Chief Information Officer was alerted to this issue three weeks before the Security Now discussion, but the response remains unclear.
What This Means for Software Supply Chains
This situation exemplifies the "supply chain attack" vector that security professionals have warned about for years. The XZ Utils backdoor attempt in early 2024 demonstrated how patient attackers can compromise widely-used open-source projects. Now we're seeing that even without malicious intent, the structure of open-source development creates vulnerabilities.
The implications extend far beyond government systems. If the Pentagon's vetted repositories contain such risks, what does this mean for private enterprises relying on the same open-source ecosystem?
Key Takeaways
- Open-source dependencies create hidden vulnerabilities even in highly secure environments
- Geographic location of maintainers matters when dealing with critical infrastructure
- "Vetted" doesn't mean continuously monitored - static security reviews miss ongoing risks
- Single maintainers for popular projects represent unacceptable risk regardless of their location
- Supply chain attacks remain severely underestimated as an attack vector
The Bottom Line
The fast-glob situation reveals a fundamental weakness in how even the most security-conscious organizations approach open-source dependencies. While Denis Malinochkin appears to be maintaining the project responsibly, the structural vulnerability created by having critical infrastructure dependent on individuals subject to foreign state influence represents an unacceptable risk. As Steve Gibson noted, this isn't about individual integrity—it's about recognizing that supply chain security requires more than good intentions. Organizations must reassess their dependency management strategies before these theoretical vulnerabilities become active exploits.
Subscribe to hear more security analysis: https://twit.tv/shows/security-now/episodes/1041