▲ | cube00 3 days ago | ||||||||||||||||
> But right now there are still no signed dependencies Considering these attacks are stealing API tokens by running code on developer's machines; I don't see how signing helps, attackers will just steal the private keys and sign their malware with those. | |||||||||||||||||
▲ | deevus 3 days ago | parent [-] | ||||||||||||||||
Could they detect code running from a new IP address or location and ask for a 2FA code? | |||||||||||||||||
|