THE LINUX FOUNDATION PROJECTS
Category

News

Webinar – Open Chain AI SBOM Self Certification & ISO 4200X

By ai, News, Webinar

About This Webinar:

This webinar explored the direction of OpenChain AI SBOM Self-Certification and its role in supporting responsible AI governance.

Xiaobo shared insights on transparency and explainability within ISO 42001, along with practical recommendations for implementing AI SBOM in alignment with ISO 42003. The session also covered key considerations and real-world approaches, supported by relevant materials.

Overall, the webinar highlighted how OpenChain AI SBOM can help organizations improve transparency, strengthen compliance, and enable more effective AI implementation.

Watch This Webinar:

Webinar – Open Chain AI SBOM Self Certification & ISO 4200X

 

OpenChain Newsletter #85

By Monthly Newsletter, News

The OpenChain Newsletter provides a monthly summary of our work. It contains an overview of what we are doing to build trust around license compliance and security in the open source supply chain. We accept suggestions and ideas. Feel free to mail us at any time.

This month’s update highlights significant momentum in global adoption, alongside a big ‘Open Chain and Friends’ event with many tracks including Compliance, AI, CRA, Automotive, Education, and so on.

New Executive Director on Board

We are pleased to announce that Mary Meixia Wang has joined the OpenChain Project as our new Executive Director.

We extend our sincere gratitude to our board members and contributors for their continued dedication and support. We would also like to recognize the pioneering leadership of Shane Coughlan whose vision and commitment have been instrumental in establishing OpenChain’s global success. For  more information, see https://openchainproject.org/news/2026/03/05/our-new-executive-director-for-openchain

New Adopters (ISO/IEC 5230, ISO 18974)

The ecosystem continues to expand with major industry players announcing conformance. This is a strong signal for supply chain managers to review their own vendor requirements.

Event

Open Chain and Friends event in Stuttgart

“OpenChain and Friends” is an in-person community event focused on open source software supply chain management, compliance, and collaboration. It’s organized by the OpenChain Project in partnership with local and international communities, such as The FOSS-LÄND Community. The event takes place in Stuttgart, Germany and gathers people working with open source across different industries.

for more information, see https://openchainproject.org/news/2025/12/09/openchain-and-friends-2026

For blogs, see https://openchainproject.org/news

SBOM Document Quality Guideline

We are announcing a public comment period for the SBOM Document Quality Guide that has been developed by the OpenChain SBOM Work Group.SBOM Document Quality Guide: https://lnkd.in/dhe3gFVW

Read Previous Newsletters:

Public Comment Period – SBOM Document Quality Guide – Ends 31st May 2026

By Featured, News

Public Comment Period – SBOM Document Quality Guide – Ends 31st May 2026Happening Now:We are announcing a public comment period for the SBOM Document Quality Guide that has been developed by the OpenChain SBOM Work Group.

Document: SBOM Document Quality GuideWhy This Is Happening:The OpenChain Project has a formal process for public comment periods related to important releases like the SBOM Document Quality Guide. These public comment periods signify that we have completed work on a topic, and now want to ensure people outside of the OpenChain Project and its work groups can provide additional input as needed. After the public comment period, we formally release the relevant document.How to write comments:We are accepting comments via our SBOM Work Group mailing list and through our monthly calls. The recommended way of providing feedback is via the mailing list.You can read the full process (and our other processes) here: https://lnkd.in/d7D4RmgNYou can find the URL for the mailing list here: https://lnkd.in/dEUf_tzKYou can find our SBOM Work Group calls (and all other OpenChain calls) list here: https://lnkd.in/dcA8pDR9A big thanks to @Norio Kobota and the whole of the OpenChain Project SBOM Work Group work on this document.

Keynote “Digital Sovereignty or Digital Dependency – Europe’s Tech Moment of Truth”

By News

They say “data is the new oil” and this highlights a critical vulnerability for Europe. Our reliance on non-European hyperscalers for data storage creates a significant dependency, raising serious questions about control, security, and resilience. What if these dominant nations restrict services, or how our data being used? Companies like Microsoft can not guarantee that European data won’t be used by others while it is stored outside of Europe.
Digital sovereignty means you have full control over your data, software, and infrastructure. Digital sovereignty isn’t just about knowing your dependencies; it’s about actively eliminating them. Björn Schiessle from NextCloud highlighted that Europe not only must act but, crucially, can act now. Many organizations remain stuck in theoretical debates, overlooking that solutions already exist. Arguments like “we need European hyperscalers first” often serve as excuses preventing change. Key pathways include developing European hyperscalers, utilizing existing European solutions, defining missing features, and making informed decisions. By consciously steering our decisions and investments towards the right solutions, digital sovereignty can transition from a mere aspiration to a practical reality.

Introduction to CRAIG – Your Cyber Resilience Act Community

By News

The EU Cyber Resilience Act (CRA) is a challenge and also an opportunity.  It is transforming cybersecurity from an optional extra into a mandatory market entry requirement. This presents a significant question for manufacturers across Europe. Dirk Leopold  during the Open chai and Friends event  presented a great solution of collaboration, that is the CRA Community. CRAIG is a community-driven Non-Profit Association designed to support the implementation of the CRA. Its mission is clear: “We bridge the gap between complex legal requirements and practical technical application, and we strengthen cyber resilience across European industry by making security-by-design, secure development practices, and risk assessment accessible to organizations with limited resources.”

CRAIG empowers organizations, particularly those with limited resources, to meet these new standards. Whether you’re an engineer, a researcher, or a corporation, CRAIG offers an open, collaborative platform where you can get inspired, share ideas and develop together with others. This platform acts as a central source of information, but also much more. CRAIG also organizes working groups for the most important topics to create guidance and collect best practices for small companies up to large multinationals. Through this Community you also have to chance to connect to peers in your region and participate local events.

Are you interested? – check the official website for more information: CRAIG | Your CRA Community

Automate your OSPO via Open Source Collaboration

By Featured, News

At a recent session of OpenChain & Friends 2026, the standard slide deck was replaced by a whiteboard and a candid, community-driven discussion. The goal? To map out how an Open Source Program Office (OSPO) moves from manual chaos to automated efficiency.

1. The Foundation: Policy and Configuration

The group reached a rapid consensus: Policy is the “North Star.” Every automation effort must stem from a clear policy. However, participants emphasized that automation isn’t a “set it and forget it” tool. It requires proper configuration to yield meaningful results; otherwise, you are simply automating the generation of “noise.”

2. The Carrot vs. The Stick

The discussion split OSPO responsibilities into two clear tracks:

  • The Carrot (Value/Contribution): Automation here focuses on lowering the barrier for Open Source and InnerSource contributions. By streamlining the “give back” process, companies unlock developer productivity and innovation.

  • The Stick (Compliance/Cost): This is the defensive play. Key components identified for automation include maintaining a List of Approved FOSS, tracking all components, and utilizing both static and dynamic detection for license and security (best effort) compliance.

3. Solving the Supplier & Legal Bottleneck

A major takeaway involved the supply chain. Supplier compliance is non-negotiable, but how do we get them there?

  • Peer-to-Peer Convincing: If a supplier is stuck using outdated methods (like manual snippet scanning), the most effective solution isn’t a stern email—it’s a connection. Introducing them to another OSPO with a successful automated setup provides the social proof needed to change their workflow.

  • External Legal Intelligence: For those without a dedicated legal team, the room recommended leveraging industry-standard resources like the OSADL License Checklists or the ScanCode database to verify license requirements.

4. The Power of Upstream and Community

The final, and perhaps most vital, point was about the human element behind the automation.

  • Fix it Upstream: When you find a bug or a compliance issue, fix it in the actual project. Upstreaming doesn’t just help the community; it saves your team the effort of maintaining a private fork forever.

  • Talk to the Experts: If you are stuck, don’t hire a consultant who doesn’t understand the “flow.” Reach out to the community. The best advice comes from those who are actively part of the ecosystem and understand the nuances of the projects you use.

 

Efficient FOSS Compliance: The Power of Community Curation and FOSSology

By Featured, News

At the Open Chain and Friends event this March, one session stood out for its immediate practical value. Divided into two parts, the presentation moved from the “Why” of community curation to the “How” of technical implementation.

Following the Chatham House Rule, here is a simplified breakdown of the most practical session of the day.

Part 1: The Community Approach (OSSelot)

The first half of the session addressed a common headache: every company spends hours scanning the same open-source packages (like curl or bash) independently. This is a massive waste of resources.

The solution presented is OSSelot—a public curation database. Instead of starting from scratch, you can download pre-cleared compliance data.

  • What you get: Curated SPDX reports, license texts, and copyright notices that have already been reviewed by experts.

  • The Goal: To drastically reduce the time needed to clear a software package by reusing existing work.

Part 2: Putting it into Practice (FOSSology)

The second half, led by a deep dive into FOSSology, showed exactly how to automate this workflow. The beauty of this approach is in how it handles version updates.

The 3-Step Workflow:

  1. Baseline Upload: You upload the “official” version of a package from OSSelot into FOSSology (often via a simple API call or URL upload).

  2. Import Curated Data: Since the OSSelot data is already “cleared,” FOSSology absorbs this information instantly.

  3. The “Delta” Scan: When you need to check a new version of that software, you run a scan and tell FOSSology to reuse the results from the OSSelot baseline.

Why this is a game-changer: FOSSology will automatically match the files that haven’t changed. You only have to manually review the new or modified files.

Final Thoughts

This was very practical and most interesting session for me at that day. It transformed the daunting task of license compliance into a manageable, collaborative process. By using community-curated data and the “Reuse” features of FOSSology, we can stop reinventing the wheel and focus only on what has actually changed in our code.

It’s a perfect example of how sharing creates value for everyone in the open-source ecosystem.

 

 

 

Surviving the AI Slopageddon: Is Open Source Breaking?

By Featured, News

The Problem: From “Bricks” to “Concrete Walls”

Traditionally, Open Source was built like a brick house: humans shared small patches of code, talked to each other, and built a community.

Today, we are facing the “Concrete Wall Drop.” AI can generate entire modules in seconds. Instead of humans collaborating, we have AI agents “dropping” massive amounts of code into projects. This is what experts call AI Slop—code that looks professional and has great documentation, but is often messy, redundant, or plain wrong inside.

The Reviewer’s Nightmare

The biggest issue is that writing code is now infinite, but checking it is not. * The Bottleneck: AI can create 1,000 lines of code instantly, but a human still needs hours to make sure it doesn’t have security holes.

  • The Shift: The hard work has moved from the writer to the reviewer. Maintainers are getting exhausted trying to spot “hallucinations” hidden behind neat-looking AI formatting.

Why the System is Shaking

Open Source used to work because of visibility. You used a tool, talked to the creator, and maybe donated or hired them.

Now, AI agents act as middlemen. A user asks an AI for an app, the AI grabs the code, and the user never even sees the human who actually maintains it. This makes the developer’s work invisible. If the people building the foundations of our software aren’t seen or supported, they might just stop building.

What’s Next?

We are moving into an “AI-native” world. To survive the Slopageddon, the community needs to find new ways to:

  1. Spot the “Slop”: Filter out low-quality AI code automatically.

  2. Protect Humans: Make sure the people behind the code are still visible and supported.

  3. Redefine Trust: We can’t trust code just because it “looks” right anymore.

The bottom line: AI can write code, but it can’t take responsibility for it. Keeping humans in the loop is the only way to save Open Source.

 

The Good, The Bad, and The Breached: A View into Supply Chain Security

By News

In the realm of cybersecurity, the theory of supply chain security often appears clean and straightforward. The reality is different. It’s a complex, multi-faceted challenge riddled with common yet dangerous mistakes that persist across organizations. This vital session, presented by Daniel Mihajlov from Robert Bosch GmbH, offered a practical look at the danger of neglecting software supply chain security. Understanding the software supply chain security regulations is no easy task. It involves a multitude of stakeholders, from developers and legal teams to incident response units, authorities, and third-party companies. This complexity demands a unified, comprehensive strategy, moving beyond mere reactive measures to embrace proactive security.

Mihajlov highlighted a critical issue: “Checkbox compliance.” This occurs when individual departments complete their own security checklists without anyone taking a holistic view of the entire system. While all the paperwork might be perfect, this siloed approach inevitably leaves some weak points, creating a false sense of security. The problem isn’t the compliance checks themselves, but how they’re conducted – often prioritizing documentation over actual security posture. This leaves organizations vulnerable despite their best efforts.

Another compelling example of a common vulnerability is the “ghost ship” – widely used applications relying on old, unmaintained open-source libraries for critical functions. Imagine a scenario where the original developer has moved on, no one monitors the project, and crucial security updates or patches are simply not happening. If a publicly known critical vulnerability emerges in such a component, the entire application sails into dangerous waters. A dependency without an active maintainer is, undeniably, one of the biggest problems in today’s software landscape.

The session reinforced these points with numerous use cases and real-world attack examples, mentioning also how the artificial intelligence based solutions used today to do more sophisticated attacks against companies. Lesson learned: even if your internal systems are robustly secure, your entire security posture is only as strong as your weakest link – including your suppliers’ systems. If you share data with a vendor whose systems are compromised, your data is also at risk.

Training-as-Code: A New Era for Open Source Literacy

By News

At a recent gathering of open-source compliance and education experts, a transformative approach to corporate learning was presented: Eclipse OSILK (Open Source & InnerSource Learning Kit). The presenter highlighted how the industry is moving away from static, hard-to-maintain training decks and toward a developer-centric “as-code” model.

The Problem: The “Maintenance Trap”

Organizations today face a significant challenge in scaling open-source literacy. While training materials exist, they often suffer from:

  • Poor Reusability: Rigid formats (like PDFs or complex PowerPoints) make it difficult to extract and repurpose content.

  • Customization Barriers: It is hard to adapt generic open-source training to an organization’s specific internal policies.

  • Stagnation: Once created, these materials are difficult to maintain, quickly becoming outdated as technologies and licenses evolve.

The Solution: Eclipse OSILK

The core philosophy of the session was simple: Treat training material like software source code. By using AsciiDoc—a lightweight markup language—training content becomes text-based, modular, and version-controlled. This “Training-as-Code” approach offers several key advantages:

  • Collaborative by Nature: Using tools like Git, multiple contributors can track changes, manage releases, and accept community contributions via pull requests.

  • Single Source, Multiple Outputs: A single text file can be rendered into various formats (slides, web pages, or handbooks) using tools like Antora or Pandoc.

  • Modular Content: Content is broken down into small, reusable snippets. As shown in the “Modular Content Structure” diagram, specific modules (e.g., JS, PHP, or C# specifics) can be pulled into different “Courses” as needed.

  • Forkable: Just like software, an organization can “fork” the OSILK base materials and add their own internal compliance layers without breaking the link to the original source.

Roadmap and Real-World Use

The initiative, currently in the Eclipse Incubation phase, is already seeing adoption by major players like Michelin and various engineering schools.

The future roadmap for OSILK focuses on expanding content—moving from basic awareness to deep dives into consumption, contribution, and launching open-source projects. There is also a strong push toward automation and localized translations to make open-source literacy accessible on a global scale.


Key Takeaway

The consensus among participants was that scaling education requires the same agility we apply to software. By adopting the Training-as-Code mindset, organizations can finally move past the “static slide” era and build a living, breathing knowledge base for the open-source community.