▲ | acdha 6 days ago | ||||||||||||||||||||||
Think about how the three major recent incidents were caught: not by individual users installing packages but by security companies running automated scans on new uploads flagging things for audits. This would work quite well in that model, and it’s cheap in many cases where there isn’t a burning need to install something which just came out. | |||||||||||||||||||||||
▲ | kjok 5 days ago | parent | next [-] | ||||||||||||||||||||||
I think there's some confusion here. No automated scan was able to catch the attack. It was an individual who notified these startups. | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | nikanj 5 days ago | parent | prev | next [-] | ||||||||||||||||||||||
Automated scans have detected 72251 out of the previous 3 supply-chain attacks | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | davidpfarrell 5 days ago | parent | prev [-] | ||||||||||||||||||||||
Wow so couldn't said security co's establish their own registry that we could point to instead and packages would only get updated after they reviewed and approved them? I mean I'd prolly be okay paying yearly fee for access to such a registry. | |||||||||||||||||||||||
|