| ▲ | FiloSottile 3 hours ago | |
There is no criticism of GitHub in the post, aside from throwing a bit of shade at them using mutable git tags for Actions instead of actually building a package manager. The lack of verification of ecosystem-specific authenticity is natural, as the post says, in reading source directly from any code host. NPM has the same problem if you click through to the source repository and expect what you read to match the package. It’s been used to hide attacks in that ecosystem in the same way, and the NPM web UI recently added a code browser similar to the one in this post. If anything, the extra upload step of NPM (and similar centralized registries) makes things worse by encouraging and normalizing publishing different source from what is in the VCS. (Also, Go doesn't use GitHub as a package manager. It's just one of the many supported code hosts. In fact, anything that can serve a VCS repo or a zip file is supported.) | ||
| ▲ | johnmaguire 30 minutes ago | parent [-] | |
> aside from throwing a bit of shade at them using mutable git tags for Actions instead of actually building a package manager I mean, you can use SHA instead. | ||