top | item 45171859

(no title)

33a | 5 months ago

We also caught this right away at Socket,

https://socket.dev/blog/npm-author-qix-compromised-in-major-...

While it sucks that this happened, the good thing is that the ecosystem mobilized quickly. I think these sorts of incidents really show why package scanning is essential for securing open source package repositories.

discuss

order

Yoric|5 months ago

So how do you detect these attacks?

33a|5 months ago

We use a mix of static analysis and AI. Flagged packages are escalated to a human review team. If we catch a malicious package, we notify our users, block installation and report them to the upstream package registries. Suspected malicious packages that have not yet been reviewed by a human are blocked for our users, but we don't try to get them removed until after they have been triaged by a human.

In this incident, we detected the packages quickly, reported them, and they were taken down shortly after. Given how high profile the attack was we also published an analysis soon after, as did others in the ecosystem.

We try to be transparent with how Socket work. We've published the details of our systems in several papers, and I've also given a few talks on how our malware scanner works at various conferences:

* https://arxiv.org/html/2403.12196v2

* https://www.youtube.com/watch?v=cxJPiMwoIyY

veber-alex|5 months ago

AI based code review with escalation to a human

hsbauauvhabzb|5 months ago

[deleted]

josephg|5 months ago

Apparently it found this attack more or less immediately.

It seems strange to attack a service like this right after it actively helped keep people safe from malware. I'm sure its not perfect, but it sounds like they deserve to take a victory lap.

fn-mote|5 months ago

You could at least offer some kind of substantive criticism of the tool (“socket”).

hsbauauvhabzb|5 months ago

For those interested, points associated with this post spiked to at least 4 then dropped back to one. Take of that what you will.