Multiple Lines
Multiple LinesMultiple Lines
Up Arrow
Back to Blog
Security

What Really Burns? The 4 Elements of Library Lifecycle

By 
Roi Abitboul

In the world of applications, libraries pass through four distinct stages that mirror the elements of nature—air, earth, water, and fire. Just as in nature, each stage has its characteristics, but only one stage can BURN. In this blog we will explore these four stages and assess the risks—or lack thereof—that each one poses to your application. 

Stage 1: In Repository (Air)

In the first stage, libraries exist only as ideas. They are defined in configuration files, but they don’t yet have substance. They float in the project’s dependencies, invisible but present, just waiting for the opportunity to become part of the environment. It’s easy to see why repository presence is very similar to the Air element.

Stage 2: Deployed to Disk (Earth)

When a library moves from the repository and is installed onto the system, it is grounded and has a physical presence, like the earth element. It is stored on disk, ready to be used, but still poses no immediate threat. In this phase, libraries are visible to the system, but their mere presence does not pose any risk. Many security tools flag these libraries, even though at this stage they are not a threat. 

Stage 3: Loaded into Memory (Water)

Now the libraries start flowing into the application, meaning that the application has access to these libraries. Just like the water element, the libraries are adaptable and fluid. At this stage, the code is loaded into memory by the application during runtime, making it available for use, but not yet activated, therefore these libraries are not a security risk at this stage. The potential for action increases, but it is not a risk unless invoked. However, many security systems fail to differentiate between libraries that are loaded and those that are actually executed.

Stage 4: Actual Execution (Fire)

Finally, we reach the critical stage—execution. When the application invokes functions from the library, it’s like fire sparking into existence—capable of causing real harm.

The Problem with Traditional Security Approaches

At this point, it is clear that only executed libraries pose a real threat to the application. Libraries that are in repository, deployed to disk and loaded to memory are harmless. Even if a library has known vulnerabilities with a known exploit and a high CVSS score, it still represents a potential future risk, if it’s never executed, it poses no real threat. That said, traditional security approaches generate vulnerability warnings for all of these libraries which cause significant wasted resources as developers and security teams are forced to address these alerts. This is especially true when the transitive vulnerabilities are found in non-executed stages. 

If your organization has infinite engineering resources, by all means, fix every vulnerability in your code. Since most organizations have limited resources, fixing vulnerabilities in code that is not executed is not just inefficient; it’s counterproductive. This diverts critical resources from innovation and real security risks. 

Raven’s Approach: Only Fire Burns

At Raven, we deprioritize over 90% of vulnerabilities by analyzing runtime code and focus on the executed stage. By doing this, your teams can prioritize the real risks.

Book a demo today for more information on Raven’s Runtime Vulnerability Management.

Share this post
Yellow Lines

Get a Demo

Meeting Booked!
See you soon!
Until we meet, you might want to check out our blog
Oops! Something went wrong while submitting the form.
Ellipse
Security

7 Reasons Why Attackers Shifted Towards Cloud Applications

Attackers are increasingly shifting their focus from infrastructure to applications, exploiting vulnerabilities that traditional security measures cannot protect.
Read more
Security

The Critical Need for Cloud Runtime Application Security

While shift left strategies are essential for building secure applications, they are not sufficient on their own. Cloud runtime application security, or protect right, is crucial especially as attackers are increasingly shifting their focus to applications.
Read more
Security

What are CVE-Less Threats?

What CVE-less threats are, why they are becoming more prevalent, and how organizations can protect themselves against these insidious risks.
Read more
Yellow Lines
{ "@context": "https://schema.org", "@graph": [ { "@type": ["Organization"], "@id": "https://raven.io/#organization", "name": "Raven - Runtime Application Protection", "url": "https://raven.io/", "sameAs": [ "https://x.com/Ravencloudinc", "https://www.linkedin.com/company/raven-cloud/about/" ], "logo": { "@type": "ImageObject", "@id": "https://raven.io/#logo", "inLanguage": "en-US", "url": "https://cdn.prod.website-files.com/65a4638e376d11af3056eaeb/66563d1d5dbe6bab908ce612_7%20Reasons%20why.png", "contentUrl": "https://cdn.prod.website-files.com/65a4638e376d11af3056eaeb/66563d1d5dbe6bab908ce612_7%20Reasons%20why.png", "width": 218, "height": 416, "caption": "Raven - Runtime Application Protection" } }, { "@type": "WebSite", "@id": "https://raven.io/#website", "url": "https://raven.io/", "name": "Raven - Runtime Application Protection", "description": "De-prioritize 93% of vulnerabilities, stop application attacks early in the kill chain and prevent vulnerabilities in the first place with runtime patching.", "publisher": { "@id": "https://raven.io/" }, "potentialAction": [ { "@type": "SearchAction", "target": { "@type": "EntryPoint", "urlTemplate": "https://raven.io/?s={search_term_string}" }, "query-input": "required name=search_term_string" } ], "inLanguage": "en-US" }, { "@type": "WebPage", "@id": "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle#webpage", "url": "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle", "name": "Application Library Lifecycle and Security Risks | Raven.io", "isPartOf": { "@id": "https://raven.io/#website" }, "primaryImageOfPage": { "@id": "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle#primaryimage" }, "datePublished": "2024-10-10", "dateModified": "2024-10-17", "description": "Understanding the Four Stages of Library Lifecycle: How Each Stage Relates to Security Risks and Why Only Executed Libraries Pose a Threat.", "inLanguage": "en-US", "copyrightYear": "2024", "copyrightHolder": { "@id": "https://raven.io/#organization" }, "potentialAction": [ { "@type": "ReadAction", "target": [ "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle" ] } ], "about":[ { "@type":"Thing", "name":"cloud", "sameAs":[ "https://en.wikipedia.org/wiki/Cloud_computing", "https://www.google.com/search?q=cloud&kgmid=/m/02y_9m3" ] }, { "@type":"Thing", "name":"apps", "sameAs":[ "https://en.wikipedia.org/wiki/Mobile_app", "https://www.google.com/search?q=apps&kgmid=/m/0h94y36" ] }, { "@type":"Thing", "name":"cloud security", "sameAs":[ "https://en.wikipedia.org/wiki/Cloud_computing_security", "https://www.google.com/search?q=cloud+security&kgmid=/m/09v8lc9" ] }, { "@type":"Thing", "name":"vulnerabilities", "sameAs":[ "https://en.wikipedia.org/wiki/Vulnerability_(computing)", "https://www.google.com/search?q=vulnerabilities&kgmid=/m/048vgs" ] }, { "@type":"Thing", "name":"the cloud", "sameAs":[ "https://en.wikipedia.org/wiki/Cloud_computing", "https://www.google.com/search?q=the+cloud&kgmid=/m/02y_9m3" ] }, { "@type":"Thing", "name":"microsoft", "sameAs":[ "https://en.wikipedia.org/wiki/Microsoft", "https://www.google.com/search?q=microsoft&kgmid=/m/04sv4" ] }, { "@type":"Thing", "name":"saas", "sameAs":[ "https://en.wikipedia.org/wiki/Software_as_a_service", "https://www.google.com/search?q=saas&kgmid=/m/06_4c_" ] }, { "@type":"Thing", "name":"owasp", "sameAs":[ "https://en.wikipedia.org/wiki/OWASP", "https://www.google.com/search?q=owasp&kgmid=/m/06nr9c" ] }, { "@type":"Thing", "name":"risks", "sameAs":[ "https://en.wikipedia.org/wiki/Risk", "https://www.google.com/search?q=risks&kgmid=/m/06d5f" ] }, { "@type":"Thing", "name":"visibility", "sameAs":[ "https://en.wikipedia.org/wiki/Visibility", "https://www.google.com/search?q=visibility&kgmid=/m/05xqwk" ] }, { "@type":"Thing", "name":"cybersecurity", "sameAs":[ "https://en.wikipedia.org/wiki/Computer_security", "https://www.google.com/search?q=cybersecurity&kgmid=/m/022x_" ] }, { "@type":"Thing", "name":"infrastructure", "sameAs":[ "https://en.wikipedia.org/wiki/Infrastructure", "https://www.google.com/search?q=infrastructure&kgmid=/m/017kvv" ] }, { "@type":"Thing", "name":"malware", "sameAs":[ "https://en.wikipedia.org/wiki/Malware", "https://www.google.com/search?q=malware&kgmid=/m/0582c" ] }, { "@type":"Thing", "name":"data breaches", "sameAs":[ "https://en.wikipedia.org/wiki/Data_breach", "https://www.google.com/search?q=data+breaches&kgmid=/m/03c18t5" ] }, { "@type":"Thing", "name":"cloud computing", "sameAs":[ "https://en.wikipedia.org/wiki/Cloud_computing", "https://www.google.com/search?q=cloud+computing&kgmid=/m/02y_9m3" ] }, { "@type":"Thing", "name":"security", "sameAs":[ "https://en.wikipedia.org/wiki/Computer_security", "https://www.google.com/search?q=security&kgmid=/m/022x_" ] }, { "@type":"Thing", "name":"cyberattacks", "sameAs":[ "https://en.wikipedia.org/wiki/Cyberattack", "https://www.google.com/search?q=cyberattacks&kgmid=/m/0p78w_d" ] }, { "@type":"Thing", "name":"cloud", "sameAs":[ "https://en.wikipedia.org/wiki/Cloud", "https://www.google.com/search?q=cloud&kgmid=/m/0csby" ] }, { "@type":"Thing", "name":"compliance", "sameAs":[ "https://en.wikipedia.org/wiki/Regulatory_compliance", "https://www.google.com/search?q=compliance&kgmid=/m/053ldb" ] }, { "@type":"Thing", "name":"cloud services", "sameAs":[ "https://en.wikipedia.org/wiki/Cloud_computing", "https://www.google.com/search?q=cloud+services&kgmid=/m/02y_9m3" ] } ] }, { "@type": "TechArticle", "@id": "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle#TechArticle", "isPartOf": { "@id": "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle#webpage" }, "wordCount": 590, "publisher": { "@id": "https://raven.io/#organization" }, "image": { "@id": "https://raven.io/blog/what-really-burns-the-4-elements-of-library-lifecycle#primaryimage" }, "thumbnailUrl": "https://cdn.prod.website-files.com/65a4638e376d11af3056eaeb/670dd3381b914229436d2eba_670dd31c193f5bd7cb9ba5be_Group%25201171274637.png", "keywords": [ "Elements of Library Lifecycle" ], "articleSection":[ "What Really Burns? The 4 Elements of Library Lifecycle", "Stage 1: In Repository (Air)", "Stage 2: Deployed to Disk (Earth)", "Stage 3: Loaded into Memory (Water)", "Stage 4: Actual Execution (Fire)", "The Problem with Traditional Security Approaches", "Raven’s Approach: Only Fire Burns", "Get a Demo" ] } ] }
Don’t Leave Empty-Handed!
Before you go, grab our latest eBook packed with insights and expert strategies. Download it for free now!
Get the eBook