{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/open-source-code","result":{"data":{"contentfulDictionaryTerm":{"title":"Open Source Code","slug":"open-source-code","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Are you using open source code in your website or application? Here's what you need to know about the good, the bad, and the ugly of open source code security."}},"body":{"body":"# Open Source Code\nCode used to create websites or applications that is made available for anyone to view, modify, or use. This allows many programmers to save time because they avoid the need to write code that already exists, but also poses a threat because the code is also available for attackers to view and exploit.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"open-source-code","style":"position:relative;"},"children":[{"type":"text","value":"Open Source Code"},{"type":"element","tagName":"a","properties":{"href":"#open-source-code","ariaLabel":"open source code permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Code used to create websites or applications that is made available for anyone to view, modify, or use. This allows many programmers to save time because they avoid the need to write code that already exists, but also poses a threat because the code is also available for attackers to view and exploit."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Open Source Code","slug":"open-source-code","keepLearning":[{"title":"Open Source Hardening Project","slug":"open-source-hardening-project"},{"title":"Operating System","slug":"operating-system"},{"title":"Over-the-air attack","slug":"over-the-air-attack"}],"breadcrumb":{"location":"/dictionary/open-source-code","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/open-source-code","crumbLabel":"open-source-code"}]}}},"staticQueryHashes":["1614255152"]}