| ▲ | chrisweekly 4 hours ago | |||||||||||||||||||||||||
Postinstall scripts are deadly. Everyone should be using pnpm. Crazy that an "orphan" commit pushed to a FORK(!) could trigger this (in npm clients). IMO GitHub deserves much of the blame here. A malicious fork's commits are reachable via GitHub's shared object storage at a URI indistinguishable from the legit repo. That is absolutely bonkers. | ||||||||||||||||||||||||||
| ▲ | fabian2k 4 hours ago | parent | next [-] | |||||||||||||||||||||||||
Once you run your app with the updated dependencies, that code is executed anyway. And root or non-root doesn't matter, the important stuff is available as the user running the application anyway. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | jonchurch_ 2 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
The compromised action here was using pnpm. They poisoned the github action cache, which was caching the pnpm store. The chain required pull_request_target on the job to check bundle size, which had cache access and poisoned the main repo’s cache The malicious package that was publisjed will compromise local machines its installed in via the prepare script, though. | ||||||||||||||||||||||||||
| ▲ | yetanotherjosh 3 hours ago | parent | prev [-] | |||||||||||||||||||||||||
How is this not a Github P0? Can anyone explain? When I read that, I thought they must be using 'fork' wrong, and actually mean branch on the official repo, as that can't be right!?" Good lord. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||