Skip to main content
Catalog
T004
Technology

Dependency Tree Decay

HIGH(80%)
·
February 2026
·
4 sources
T004Technology
80% confidence

What people believe

Using libraries saves time and is more reliable than building from scratch.

What actually happens
+742%Software supply chain attacks (annual)
+500-1400%Transitive dependencies (avg Node.js project)
+200-300%Time spent on dependency maintenance
RoutineCritical vulnerabilities from dependencies (annual)
4 sources · 3 falsifiability criteria
Context

Modern software is built on towers of dependencies. A typical Node.js project has 500-1,500 transitive dependencies. A Python project has 50-200. Each dependency is maintained by someone else — often a single unpaid volunteer. The left-pad incident (2016), the log4j vulnerability (2021), and the xz backdoor (2024) all demonstrated the same structural fragility: critical infrastructure depends on code maintained by strangers with no obligation to keep it working or secure. Dependencies decay silently. Maintainers burn out, abandon projects, or introduce vulnerabilities. By the time you notice, the rot has spread through your entire dependency tree. The convenience of 'just npm install it' creates a supply chain that nobody owns and everybody depends on.

Hypothesis

What people believe

Using libraries saves time and is more reliable than building from scratch.

Actual Chain
Transitive dependencies create invisible attack surface(Average project: 500-1500 transitive deps in Node.js)
Developers don't know what 95% of their dependencies do
Each dependency is a potential supply chain attack vector
Vulnerability scanners generate alert fatigue from deep dependency issues
Maintainer burnout creates abandoned critical packages(30% of npm packages have no commits in 2+ years)
Single maintainer projects are single points of failure for thousands of apps
Abandoned packages don't get security patches
Supply chain attacks target the weakest link(Software supply chain attacks up 742% since 2019)
Attackers compromise maintainer accounts to inject malicious code
Typosquatting packages trick developers into installing malware
Backdoors can hide in dependency updates for months before detection
Version conflicts and breaking changes cascade(Average 2-3 breaking dependency updates per month)
Diamond dependency problem — two deps require incompatible versions of a third
Lockfile drift between environments causes 'works on my machine' failures
Impact
MetricBeforeAfterDelta
Software supply chain attacks (annual)~200 (2019)~1,700 (2024)+742%
Transitive dependencies (avg Node.js project)~100 (2015)500-1500 (2025)+500-1400%
Time spent on dependency maintenance5% of dev time15-20% of dev time+200-300%
Critical vulnerabilities from dependencies (annual)Rare2-5 per projectRoutine
Navigation

Don't If

  • You're adding a dependency for functionality you could write in 50 lines of code
  • The package has a single maintainer, no recent commits, and your project is security-sensitive

If You Must

  • 1.Audit direct dependencies for maintainer health, commit frequency, and security track record
  • 2.Pin exact versions and review every dependency update before merging
  • 3.Use lockfiles religiously and run npm audit / pip audit in CI
  • 4.Maintain a dependency budget — set a maximum count and justify every addition

Alternatives

  • Vendor critical dependenciesCopy the source code into your repo for critical, small packages — you own the maintenance
  • Standard library firstUse language standard libraries before reaching for third-party packages
  • Minimal dependency policyRequire justification for every new dependency — is the time saved worth the supply chain risk?
Falsifiability

This analysis is wrong if:

  • Software supply chain attacks decrease despite increasing dependency counts
  • Automated dependency management tools eliminate >95% of vulnerability exposure without developer intervention
  • Projects with 1000+ dependencies show equal or fewer security incidents than projects with minimal dependencies
Sources
  1. 1.
    Sonatype: State of the Software Supply Chain 2024

    742% increase in software supply chain attacks since 2019

  2. 2.
    xz Utils Backdoor (CVE-2024-3094)

    Sophisticated backdoor inserted by a trusted maintainer over 2 years

  3. 3.
    Log4Shell (CVE-2021-44228)

    Critical vulnerability in ubiquitous logging library affected millions of applications

  4. 4.
    OpenSSF: Securing the Open Source Supply Chain

    Industry initiative to address open source dependency security

Related

This is a mirror — it shows what's already true.

Want to surface the hidden consequences of your engineering decisions?

Try Lagbase