As organizations increasingly rely on artificial intelligence to accelerate software development, managing the security risks associated with open source dependencies has become a critical concern. The launch of ActiveState’s Curated Catalog introduces a new approach to strengthening AI generated code security by providing enterprises with a controlled and trusted source for open source components.
ActiveState, a provider of managed open source software solutions, has announced the release of its Curated Catalog, a private repository designed to give organizations secure access to vetted open source packages. The offering is intended to replace the common practice of pulling components directly from public registries, where packages may be unverified and potentially vulnerable.
The rapid adoption of AI code generation tools has significantly increased the volume of open source software used in development environments. While these tools improve productivity, they also introduce risks by incorporating external dependencies that may contain vulnerabilities or malicious code. ActiveState’s Curated Catalog addresses this challenge by enabling security teams to control which components are available for developers and AI systems to use.
The platform is built on ActiveState’s library of more than 79 million components that are rebuilt from source within a secure infrastructure. By providing verified and standardized packages, the catalog helps organizations reduce exposure to supply chain threats while maintaining development speed.
Bob Shaker, Chief Product and Technology Officer at ActiveState, highlighted the need to balance developer efficiency with security oversight. “Developers need speed, while security teams need control and too often they’re forced to compromise,” said Bob Shaker, CPTO of ActiveState. “The Curated Catalog eliminates that tradeoff by giving organizations a private library of trusted, rebuilt-from-source open-source components that developers can consume directly in their workflows and from within AI code generators. With the largest multi-ecosystem catalog of verified components, ActiveState enables enterprises to scale open source safely across 12+ language ecosystems capabilities most solutions simply can’t deliver.”
A key feature of the Curated Catalog is its ability to integrate directly with existing development tools and artifact repositories. Packages are delivered in native formats compatible with continuous integration and deployment pipelines, allowing organizations to incorporate secure components without disrupting workflows. The platform also provides continuous monitoring and automated remediation, ensuring that vulnerabilities are addressed promptly. Critical issues are resolved within five business days, while high severity vulnerabilities are addressed within ten days.
In addition, the system provides ongoing visibility into component health, offering daily updates and alerts on newly discovered vulnerabilities or required patches. This reduces the burden on security teams while ensuring that developers always have access to secure and up to date dependencies.
Industry analysts note that the growing complexity of software supply chains is driving demand for more controlled approaches to dependency management. Katie Norton, Research Manager at IDC, explained the broader trend. “Modern software stacks commonly include thousands of open source components sourced from public package registries, where provenance and integrity are not always verifiable,” said Katie Norton, Research Manager at IDC. “As software supply chain threats grow, organizations are placing more emphasis on policy-based controls and using governed sources for dependencies to reduce the likelihood that vulnerable or malicious packages enter the build pipeline. ActiveState’s Curated Catalogs are designed to operationalize that approach by centralizing dependency intake in a private catalog and delivering components through existing developer tooling and artifact repositories.”
The introduction of ActiveState’s Curated Catalog reflects a broader industry shift toward securing the software supply chain in the era of AI driven development. By enabling organizations to control and validate open source usage, the platform aims to reduce risk while supporting scalable and secure innovation.
Recommended Cyber Technology News:
- Penguin Solutions Boosts AI Inference with OriginAI
- Razorpay Partners with RedHunt Labs to Boost Cybersecurity
- Imprivata Enhances Access Management to Boost Security and Clinical Efficiency in Australia
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com

