NPM deserves some blame here, IMO. Countless third party intel feeds and security startups can apparently detect this malicious activity, yet NPM, the single source of truth for these packages, with access to literally every data event and security signal, can't seem to stop falling victim to this type of attack? It's practically willful ignorance at this point.
PokestarFan|5 months ago
Cthulhu_|5 months ago
wutbrodo|5 months ago
bnchrch|5 months ago
txdv|5 months ago
andix|5 months ago
buzuli|5 months ago
mrguyorama|5 months ago
Why in the world would they NEED to stop? It apparently doesn't harm their "business"
pants2|5 months ago
twistedpair|5 months ago
What kind of crazy AI could possible have noticed that on the NPM side?
This is frustrating as someone that has built/published apps and extensions to other software providers for years and must wait days or weeks for a release to be approved while it's scanned and analyzed.
For all the security wares that MS and GitHub sell, NPM has seen practically no investment over the years (e.g. just go review the NPM security page... oh, wait, where?).
legohead|5 months ago
stevenpetryk|5 months ago
> Things were fine before they became mainstream
As in, things were fine before we had commonplace tooling to fetch third party software?
> package files that are set to grab the latest version
The three primary Node.js package managers all create a lockfile by default.