I refer to the Log4j logging framework vulnerability - Source: https://www.wired.com/story/log4j-flaw-hacking-internet/
Since software vulnerabilities is an inevitable part of life, and speed is of an essence when it comes to patching vulnerabilities, other than adopting a reactive posture i.e., patching (patch availability is dependent on the vendor), how can end users proactively manage these risks?
Understand that there is Minimum Viable Secure Product, or simply MVSP, a concise, checks-based security baseline that is available here - https://mvsp.dev/ However, this is still largely limited to controls.
If one has very secure requirements, does the use of code fuzzing tools for all 3rd party software components/dependencies prior to introducing it into one's environment help in proactively reducing these zero-day vulnerabilities?