I'd build a layered approach, based on what you are capable of. Even development organizations don't have all the resources needed to take all possible actions.
Start with supplier management. When you use any externally produced products, you need to understand who is making it. Does the supplier have policies and procedures to mitigate risks? Do they have controls over who can contribute to open-source projects? Do they scan and remediate vulnerabilities? Does the supplier engage with users or have a user community that supports each other? Favor products that have these types of controls in place.
Consider keeping local copies of artifacts to mitigate unexpected changes or errors. This goes beyond vulnerabilities, but broader supply chain issues where a version can be unexpectedly removed from external repositories or a reference to a version can result in uncommunicated/undocumented changes. This applies to everything from open-source projects to containers to packages. Hosting your own artifact repository on your infrastructure does require IT support, but there are also SaaS solutions.
Scan the artifacts that you use yourself. Engage with the supplier to understand findings or report findings as issues. If a finding is a true positive, apply mitigations. Just because a vulnerability exists doesn't mean that it can't be mitigated in other ways. Reducing the footprint of the vulnerability may be enough to reduce the risk of using vulnerable components.