← Role Guides
Engineering & TechnologyCRA Role Guide

EU Cyber Resilience Act — Guide for Open-Source Project Maintainer

What the CRA means for your role, your team, and your day-to-day responsibilities.

The Cyber Resilience Act generated significant concern in the open-source community during its legislative development. The final text includes a stewardship exemption designed to protect volunteer maintainers who develop software outside of commercial activity. However, open-source projects that are commercialised — through corporate sponsorship, paid support, or SaaS offerings — may fall within scope. All maintainers who contribute components to commercial products benefit from understanding the CRA's open-source provisions and how to operate a CVD policy that meets modern security expectations.

Your CRA responsibilities:

  • Assess whether the project constitutes commercial activity and is therefore in scope for the CRA
  • Publish a documented CVD policy and machine-readable security contact (security.txt) regardless of CRA applicability
  • Maintain a SBOM for the project's dependencies and publish it with each release
  • Respond to vulnerability reports through a documented and timely CVD process
  • Provide guidance to downstream manufacturers who integrate the project about how to handle vulnerabilities
  • Monitor CVE databases for vulnerabilities in the project's own dependencies
  • Communicate clearly when a version reaches end-of-life and security support will cease
Engineering & Technology

Does the CRA apply to open-source projects?

The CRA's applicability to open-source software depends on whether the development activity constitutes 'commercial activity.' Article 2 and Recital 18 clarify that software developed entirely outside of commercial activity — by volunteer maintainers who receive no monetary benefit linked to the software — is exempt from CRA obligations. However, the commercial activity threshold is broad. If the project is developed by employees of a company as part of their work duties, if the project generates revenue through paid support or SaaS delivery, if the developer receives sponsorship payments, or if the company relies on the project commercially, the exemption is unlikely to apply. The European Commission has stated that a company releasing open-source code to fulfil its CRA obligations does not itself make that code in scope, but a company that builds a commercial product on open-source foundations remains responsible for the CRA conformity of the finished product.

CRA reference:Article 2, Recital 18

The CRA stewardship exemption explained

Recital 18 and Article 2 create a specific exemption for what the CRA terms 'open-source software stewards' — natural or legal persons who provide ongoing support for open-source components that are intended for commercial use, without themselves commercialising those components. Stewards are subject to a lighter regime: they are expected to have a CVD policy, but are not required to complete a conformity assessment or produce a technical file. The Commission intends to publish guidance on what constitutes an open-source software steward, but the key distinguishing criterion is the absence of commercial activity relating to the software itself. Foundations such as the Linux Foundation or Apache Software Foundation are likely to qualify as stewards for the projects they govern. Individual maintainers who accept GitHub Sponsors payments may be in a more uncertain position and should seek legal advice.

CRA reference:Article 2, Recital 18, Article 14a

CVD policy and security.txt for open-source

Even if an open-source project is entirely exempt from CRA obligations, operating a credible CVD policy is a best practice that protects users and the broader ecosystem. A CVD policy for an open-source project should document: how to report a vulnerability (preferably through a private channel such as a GitHub private security advisory or a dedicated disclosure email); the maintainers' commitment to acknowledge receipt within a defined period (48-72 hours is standard); the expected timeline from report to patch (90 days for non-critical, 7-14 days for critical is typical); and conditions under which earlier disclosure might occur. A security.txt file at the project's primary domain or GitHub profile provides a machine-readable reference to the CVD policy. Projects hosted on GitHub can enable the built-in security advisory mechanism, which provides a private channel and automates CVE ID requests through GitHub's CNA partnership.

CRA reference:Annex I Part II(5), Article 14

SBOM obligations for open-source projects

For open-source software stewards subject to the CRA's lighter regime, there is no explicit requirement to produce an SBOM. However, producing and publishing an SBOM with each release provides significant value to downstream manufacturers who integrate the project and must themselves maintain SBOMs for their CRA-compliant products. The downstream manufacturer's SBOM accuracy depends on the accuracy of SBOM data provided by the components they integrate. Open-source projects that generate SBOMs automatically from their package manifests — using tools that produce CycloneDX or SPDX output — make compliance easier for their users and reduce the likelihood that known vulnerabilities in project dependencies are missed in downstream assessments. Projects that do not publish SBOMs may find themselves deprioritised by procurement teams who need accurate component data.

CRA reference:Annex I Part II, Article 13(5)

Getting started checklist

Assess whether the project constitutes commercial activity by reviewing who contributes, whether any commercial benefit flows to contributors or maintainers, and whether any company relies on the project as part of a commercial product. If uncertain, seek legal advice or consult the CRA guidance being developed by the Open Source Initiative and ENISA. Regardless of CRA applicability, publish a security.txt file and a CVD policy document. Enable private security advisories on the project's repository if hosted on a platform that supports this. Generate and publish an SBOM as part of the release process. Set up monitoring for CVEs in the project's own dependencies, and establish a process to publish a new release or security advisory when a critical dependency vulnerability is discovered. Communicate clearly in the project README and release notes when a version will no longer receive security fixes.

CRA reference:Article 2, Annex I Part II

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for OSS Devs and their teams.

Start your free portal

Frequently asked by OSS Devs

If my open-source project is incorporated into a commercial product, am I liable for that product's CRA compliance?+

No. The CRA places the obligation on the manufacturer who places the finished product on the market. An open-source maintainer who is genuinely operating outside of commercial activity has no CRA liability for how their code is used by downstream manufacturers. The downstream manufacturer is responsible for assessing the security of all components they integrate — including open-source components — and must address any vulnerabilities found before placing the product on the market. This does not mean maintainers have no responsibility to users; operating a good CVD process is both ethically appropriate and commercially beneficial for the ecosystem.

Does accepting GitHub Sponsors payments make my project subject to the CRA?+

This is currently unsettled. The CRA's commercial activity threshold has not been defined with precision in relation to developer sponsorship. The European Commission's guidance notes that 'commercial activity' does not include accepting donations without expectation of a commercial service in return. Small-scale sponsorship payments received by an individual maintainer, without any service or deliverable obligation, are unlikely to trigger the CRA. However, a foundation or company that receives substantial sponsor revenue in connection with an open-source project, or that provides sponsors with priority security support, may cross the commercial activity threshold. Legal advice specific to the project's structure and funding model is recommended.

What should I do if a researcher reports a vulnerability in my open-source project?+

Follow your published CVD policy. Acknowledge receipt within the timeframe stated in the policy. Assess the severity and reproduce the issue. Develop and test a fix. Coordinate the disclosure timeline with the reporter — 90 days is a widely accepted default. Publish a security advisory through GitHub's advisory database or the project's security advisory mechanism, request a CVE ID, and release the fix with release notes clearly identifying it as a security update. If the vulnerability is critical and affects widely-deployed versions, consider proactive outreach to known major downstream users. Document the full timeline from report to disclosure, as this record is valuable evidence of a functioning CVD process.

Need a CVD policy template your team can deploy today?

Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.

Browse templates →