Exploring the SECURITY.md in the Dependency Chain: Preliminary Analysis of the PyPI Ecosystem
Security policies, such as SECURITY.md files, are now common in open-source projects. They help guide responsible vulnerability reporting and build trust among users and contributors. Despite their growing use, it is still unclear how these policies influence the structure and evolution of software dependencies. Software dependencies are external packages or libraries that a project relies on, and their interconnected nature affects both functionality and security. This study explores the relationship between security policies and dependency management in PyPI projects. We analyzed projects with and without a SECURITY.md file by examining their dependency trees and tracking how dependencies change over time. The analysis shows that projects with a security policy tend to rely on a broader set of direct dependencies, while overall depth and transitive dependencies remain similar. Historically, projects created after the introduction of SECURITY.md, particularly later adopters, show more frequent dependency updates. These results suggest that security policies are linked to more modular and feature-rich projects, and highlight the role of SECURITY.md in promoting proactive dependency management and reducing risks in the software supply chain.
Sun 16 NovDisplayed time zone: Seoul change
16:00 - 18:00 | |||
16:00 15mTalk | Fair Developer Score: Build-Adjusted Measurement of Effort and Impact Intelligent SE 2025 Xinzhou Wang Northwestern University, Jiancong Zhu Northwestern University, Jinghan Feng Northwestern University, Zixuan Zhang Northwestern University, Joshua Rauvola University of Chicago, Devon Delgado Digital Emissions, Ahmad Antar Digital Emissions, Abid Ali Northwestern University | ||
16:15 15mTalk | Optimizing LLM Code Suggestions: Feedback-Driven Timing with Lightweight State Bounds Intelligent SE 2025 Mohammad Nour Al Awad ITMO University, Sergey Ivanov ITMO University, Olga Tikhonova ITMO University | ||
16:30 15mTalk | Exploring the SECURITY.md in the Dependency Chain: Preliminary Analysis of the PyPI Ecosystem Intelligent SE 2025 Chayanid Termphaiboon Mahidol University, Raula Gaikovina Kula The University of Osaka, Youmei Fan Nara Institute of Science and Technology, Morakot Choetkiertikul Mahidol University, Thailand, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Kenichi Matsumoto Nara Institute of Science and Technology | ||
16:45 15mTalk | Towards MPC-driven Software Adaptation: A Dual-Layer Approach Combining ICNN-based Modeling and Delta-based Tuning Intelligent SE 2025 Yitong Shi Institute of Science Tokyo, Chenyu Hu Institute of Science Tokyo, Mingyue Zhang Southwest University, NIANYU LI ZGC Lab, China, Jialong Li Waseda University, Japan, Kenji Tei Institute of Science Tokyo | ||
17:00 15mTalk | Explainable AI for Issue Classification: A Multi-class Study with LIME and SHAP Intelligent SE 2025 | ||