Bioconductor is not a monolithic application, but a (large) collection of software packages.
All new Bioconductor package contributions receive a technical review, but this does not specifically target security vulnerabilities.
Once accepted, maintainers make commits to our git repository. There is little code review at this stage.
Bioconductor packages are almost exclusively source (R, C, C++, Fortran, etc) code in git. The main dependencies are therefore R itself, and system library dependencies. Generally, system dependencies must be satisfied by the user, and hence vulnerabilities in these libraries are not under our control. R itself responds promptly to security vulnerabilities. We try to maintain our own systems in a reasonably current state, with regular application of security and other OS updates.
The path from our git repository to build system to public repository is through https.
Our response is like our response to this query -- prompt assessment of the concern and immediate action, e.g., removing problematic packages from our public repositories, notifying upstream sources, and if necessary sharing concerns with our community through this support site, our developer mailing list, and our community slack.
can you provide context for your question?
Our Institute is heavy on security and we vet anything that gets installed in our environment as we were hit a couple of times with ransomware and other malicious activity. A couple of those were from "open-source" applications that our researchers introduced into the environment. Because of this, we have developed policy to determine which applications may be both useful and secure. It is worthy to note we do understand not everything is perfectly secure but we do try to mitigate potential issues up front to keep our environment as safe and secure but continue to give our researchers the tools to work suitably. Thank you.