You can evaluate by taking a look at the update tempo and security-specific release information for each package you are interested in.
The common case for folks who run third party/open-sourced apps publicly without firewall or VPN protection is that they fail to keep them and their dependencies updated and then some time after they fall out of date their systems are compromised.
The time between announcement of security issues and compromise attempts is shortest with something like Wordpress, where attacks can start within minutes.
But all open source apps have security issues that require a steady tempo of updates, and will have attackers looking for signatures that signal vulnerabilities.
Whether this posture is a significant risk for you is highly context-dependent, both on the impact of compromise and exposure, the attraction attackers may have to you, and on the costs- financial, human, operational- of alternative approaches.
Usually folks have information sensitive to the company in chat, and of course dev tools have custody of important assets. But from an attacker's perspective there are a lot of fish in the sea, and many highly vulnerable systems go uncompromised.
In the end, though, this is why folks wind up using SAAS services, unless they have a strategic need to self-host and are able to do so at a more professional level than hobbyist. For some definition of eventually, hobbyist hosting will eventually, inevitably, wind up in compromise.