(no title)
raesene4 | 10 years ago
I find a good way to think about things is that every single dependency you have adds another set of people you have to trust.
You're trusting the competence of the developer (i.e. that the library has no security flaws), you're trusting their intent (i.e. that they don't deliberately put malicious code into the library) and you're trusting their Operational Security practices (i.e. that their systems don't get compromised, leading to loss of control of their libraries).
Now when you think about how little you know about most of the owners of libraries you use, you can see possibility for concern.
The bit I disagree with the article about is signing. I personally think that developer signing is a useful part of this as it takes the repository owner out of the trust picture (if done correctly). Without it you're also trusting the three items above for the repository provider and it's worth noting that a large software repo. is a very tempting target for quite a few well funded attackers.
Docker at least has provided some of the technical pieces to address this in their repositories with content trust...
No comments yet.