▲ | rs186 3 days ago | ||||||||||||||||||||||
Yeah, easily solved. Would love to hear your genius solutions right here that Microsoft is too dumb to come up with and implement. | |||||||||||||||||||||||
▲ | Riverheart 2 days ago | parent | next [-] | ||||||||||||||||||||||
Well, from recent experience they could make “npm audit” usable without having to use a third party library like “better npm audit”. There’s no filtering or configuration at all. There are so many unimportant or irrelevant vulnerabilities reported that I have no doubt that people just ignore auditing because they don’t consider the 1000 high severity DoS vulnerabilities they can’t ignore relevant for their CLI app. =/ The tradeoff for security is usability and the worse the usability gets the more people fight back against it. | |||||||||||||||||||||||
▲ | righthand 2 days ago | parent | prev | next [-] | ||||||||||||||||||||||
Hate to tell ya but package signing is not a new problem and they could make it opt-in. There has been a Github issue and merge request submitted to enable it. But they were closed and denied. Malice or incompetence? Hilarious that you think this is a some sort of impossible feat for a trillion dollar company. | |||||||||||||||||||||||
▲ | dns_snek 2 days ago | parent | prev [-] | ||||||||||||||||||||||
Seriously? This is is extremely low hanging fruit that's not being taken care of. You shouldn't be able to take over a software dependency with a phishing email. Requiring simple PGP code signing or even just passkey authentication would eradicate that entire attack vector. Future attacks would then require a level access of access that's already synonymous with "game over" for all intents and purposes (e.g. physical access, malware, or inside job). It's not bulletproof but it would be many orders of magnitude better than the current situation. | |||||||||||||||||||||||
|