Ich bin geschockt und schockiert. Was ein Schocker! Wer hätte das denn ahnen können?

https://arxiv.org/pdf/2406.10279

TLDR: Künstliche Intelligenz halluziniert konsequent Pakete, welche sich, sofern ein Programmierer sich auf die KI verlässt, per Dependency Confusion exploiten lassen.

#KI #AI #moreAthanI #Sicherheitslücke #IT #DependencyConfusion #RepositoryHijacking #ProgrammerHumor

AI-generated code could be a disaster for the software supply chain. Here’s why. https://arstechni.ca/fUp9Y #packageconfusion.packagehallucination #dependencyconfusion #supplychainattac #Security #Biz&IT #AI
AI-generated code could be a disaster for the software supply chain. Here’s why.

LLM-produced code could make us much more vulnerable to supply-chain attacks.

Ars Technica
CloudImposer: Executing Code on Millions of Google Servers with a Single Malicious Package

Tenable Research discovered a remote code execution (RCE) vulnerability in Google Cloud Platform (GCP) that is now fixed and that we dubbed CloudImposer. The vulnerability could have allowed an attacker to hijack an internal software dependency that Google pre-installs on each Google Cloud Composer pipeline-orchestration tool. Tenable Research also found risky guidance in GCP documentation that customers should be aware of.

Tenable®
Over 100,000 Infected Repos Found on GitHub

The Apiiro research team has detected a repo confusion campaign that has evolved and expanded, impacting over 100k GitHub repos with malicious code.

Apiiro | Secure your development and delivery to the cloud

Using dependabot to convert internal dependencies into public, attacker-controlled ones, using dependency-confusion. Wow, nice find!

https://giraffesecurity.dev/posts/dependabot-confusion/

#DependencyConfusion #dependabot #vulnerability

Dependabot Confusion: Gaining Access to Private GitHub Repositories using Dependabot

> Birsan began hunting for names of private internal packages that he could find in manifest files on GitHub repositories or in CDNs of prominent companies but did not exist in a public open-source repository.
[ . . . ]
> In some cases, as with PyPI packages, the researcher noticed that the package with the higher version would be prioritized regardless of wherever it was located.
> Using this technique, Birsan executed a successful supply chain attack against Microsoft, Apple, PayPal, Shopify, Netflix, Tesla, Yelp, and Uber simply by publishing public packages using the same name as the company's internal ones.Wow.

#SupplyChainAttack #DependencyConfusion
LIBRANET.de | Search

"In this post, I demonstrate that critical parts of the #Haskell package management system are vulnerable to the #DependencyConfusion supply chain attack." #security #cabal #hackage

https://frasertweedale.github.io/blog-fp/posts/2021-02-12-haskell-dependency-confusion.html

pureblog - Haskell is vulnerable to dependency confusion

Ein Sicherheitsforscher demonstriert, wie er mit vergleichsweise wenig Aufwand seinen Fuß in Systeme von beispielsweise Apple, Netflix und Tesla setzen konnte.
Sicherheitsforscher bricht über Open-Source-Repositories bei PayPal & Co. ein
Sicherheitsforscher bricht über Open-Source-Repositories bei PayPal & Co. ein

Ein Sicherheitsforscher demonstriert, wie er mit vergleichsweise wenig Aufwand seinen Fuß in Systeme von beispielsweise Apple, Netflix und Tesla setzen konnte.