| ▲ | jadar 16 hours ago |
| How much do you want to bet me that the credential was stolen during the previous LiteLLM incident? At what point are we going to have to stop using these package managers because it's not secure? I've got to admit, it's got me nervous to use Python or Node.js these days, but it's really a universal problem. |
|
| ▲ | rybosome 16 hours ago | parent | next [-] |
| > it’s got me nervous to use Python or Node.js these days My feelings precisely. Min package age (supported in uv and all JS package managers) is nice but I still feel extremely hesitant to upgrade my deps or start a new project at the moment. I don’t think this is going to stabilize any time soon, so figuring out how to handle potentially compromised deps is something we will all need to think about. |
| |
| ▲ | Tazerenix 15 hours ago | parent | next [-] | | NPM only gained minimum package age in February of this year, and still doesn't support package exclusions for internal packages. https://github.com/npm/cli/pull/8965 https://github.com/npm/cli/issues/8994 Its good that that they finally got there but.... I would be avoiding npm itself on principle in the JS ecosystem. Use a package manager that has a history of actually caring about these issues in a timely manner. | | |
| ▲ | jadar 5 hours ago | parent [-] | | It almost doesn't matter, because you can get pwned by a transitive dependency. If someone doesn't have the same scruples as you have, you're still at risk. | | |
| ▲ | inbx0 2 hours ago | parent [-] | | minimumReleaseAge and lockfiles also pin down transitive dependencies. |
|
| |
| ▲ | arcfour 15 hours ago | parent | prev [-] | | PNPM makes you approve postinstall scripts instead of running them by default, which helps a lot. Whenever I see a prompt to run a postinstall script, unless I know the package normally has one & what it does, I go look it up before approving it. (Of course I could still get bitten if one of the packages I trust has its postinstall script replaced.) | | |
| ▲ | erikerikson 5 hours ago | parent [-] | | How does this stance work with your CICD? | | |
| ▲ | jadar 5 hours ago | parent [-] | | I suppose you would have to commit your node_modules, or otherwise cache your setup so that all prerequesite modules are built and ready to install without running post-install scripts? |
|
|
|
|
| ▲ | crimsonnoodle58 14 hours ago | parent | prev | next [-] |
| More like the Trivy incident (which led to the compromise of LiteLLM). |
|
| ▲ | supernes 14 hours ago | parent | prev [-] |
| There are ways to limit the blast radius, like running them in ephemeral rootless containers with only the project files mounted. |