Third-party risk encompasses the full range of ways that external packages can introduce risk beyond known CVEs. This includes maintainer compromise, where an attacker takes over a legitimate package account and publishes a malicious version, abandoned projects, where the maintainer stops responding to security reports and the package accumulates unpatched vulnerabilities, sudden ownership changes, where a popular package is sold or transferred to a new owner whose intentions are unknown, and insecure defaults, where the package ships with configuration that is functional but insecure.
Maintainer account compromise is a particularly dangerous risk because it replaces a trusted package with a malicious one in a way that looks legitimate to automated systems. If the compromised version passes checksum verification (because the attacker published through the legitimate account), there is no automated signal that anything has changed. The defense is vigilance. Monitoring for unexpected new releases from packages in active use, subscribing to the package ecosystem's security advisories, and treating any unexpected behaviour in a build after a dependency update as a signal to investigate.
Evaluating the ongoing health of a dependency requires looking beyond the CVE database. Metrics such as time since last commit, number of open unaddressed security issues, response time to security reports, number of active maintainers, and the dependency's own dependency count are all signals of future risk. A package that is actively maintained, responsive to security reports, and minimally dependent on other packages is lower risk than one that is effectively abandoned, even if it has no current CVEs.
The decision of whether to use or continue using a third-party package should be a documented, revisitable decision. Teams that adopt packages without considering long-term maintenance, and then continue using them indefinitely without review, accumulate risk that is not visible in any vulnerability scan. A simple policy that requires periodic review of high-use dependencies for continued maintenance health, and that designates an owner for responding to security advisories for each critical dependency, converts implicit risk into managed risk.