Attackers invite targets to collaborate on a project, convincing them to download and run a repository with malicious npm dependencies.
Attackers invite targets to collaborate on a project, convincing them to download and run a repository with malicious npm dependencies.
There goes the argument of non technical users falling for scams. The tables have turned!
I do wonder if this would be negated by containered applications
How do Linux distro’s deal with this? I feel like however that’s done, I’d like node packages to work in a similar way - “package distro’s”. You could have rolling-release, long-term service w/security patches, an application and verification process for being included in a distro, etc.
It wouldn’t eliminate all problems, of course, but could help with several methods of attack, and also help focus communities and reduce duplication of effort.
Would you like to develop an app?
Examine dependencies and installation scripts. Very recently published, net-new packages, or scripts or dependencies that make network connections during installation should receive extra scrutiny.
I'm a little surprised npm doesn't already do this and give you a big blinking warning in the install process about it.