Remix.run Logo
acdha 6 days ago

Think about how the three major recent incidents were caught: not by individual users installing packages but by security companies running automated scans on new uploads flagging things for audits. This would work quite well in that model, and it’s cheap in many cases where there isn’t a burning need to install something which just came out.

kjok 5 days ago | parent | next [-]

I think there's some confusion here. No automated scan was able to catch the attack. It was an individual who notified these startups.

acdha 5 days ago | parent [-]

Quite possibly - there have been several incidents recently and a number of researchers working together so it’s not clear exactly who found something first and it’s definitely not as simple to fix as tossing a tool in place.

The CEO of socket.dev described an automated pipeline flagging new uploads for analysts, for example, which is good but not instantaneous:

https://news.ycombinator.com/item?id=45257681

The Aikido team also appear to be suggesting they investigated a suspicious flag (apologies if I’m misreading their post), which again needs time for analysts to work:

https://www.aikido.dev/blog/npm-debug-and-chalk-packages-com...

My thought was simply that these were caught relatively quickly by security researchers rather than by compromised users reporting breaches. If you didn’t install updates with a relatively short period of time after they were published, the subsequent response would keep you safe. Obviously that’s not perfect and a sophisticated, patient attack like liblzma suffered would likely still be possible but there really does seem to be a value to having something like Debian’s unstable/stable divide where researchers and thrill-seekers would get everything ASAP but most people would give it some time to be tested. What I’d really like to see is a community model for funding that and especially supporting independent researchers.

nikanj 5 days ago | parent | prev | next [-]

Automated scans have detected 72251 out of the previous 3 supply-chain attacks

Imustaskforhelp 5 days ago | parent [-]

Reminds me of that michael burry quote.

davidpfarrell 5 days ago | parent | prev [-]

Wow so couldn't said security co's establish their own registry that we could point to instead and packages would only get updated after they reviewed and approved them?

I mean I'd prolly be okay paying yearly fee for access to such a registry.

davidshepherd7 5 days ago | parent | next [-]

IIUC chainguard is this, but only for python, java, and docker images so far. https://www.chainguard.dev/libraries

getcrunk 5 days ago | parent | prev [-]

I think it would be a no brainer for npm to offer this but idk why they haven’t

phatfish 5 days ago | parent [-]

Probably because they would expose themselves legally? Not sure what the current situation is exactly, but I assume it's "at your own risk".