(no title)
jefozabuss | 5 months ago
By the way why doesn't npm have already a system in place to flag sketchy releases where most of the code looks normal and there is a newly added obfuscated code with hexadecimal variable names and array lookups for execution...
mystifyingpoi|5 months ago
hombre_fatal|5 months ago
nicce|5 months ago
Cthulhu_|5 months ago
cluckindan|5 months ago
Even a max line length check would have flagged it.
cchance|5 months ago
tom1337|5 months ago
naugtur|5 months ago
automated publishing should use something like Pagerduty to signal that a version is being published to a group of maintainers and it requires an approval to go through. And any one of them can veto within 5 minutes.
But we don't have that, so gotta be careful and prepare for the worst (use LavaMoat for that)
Cthulhu_|5 months ago
dist-epoch|5 months ago
Because the malware writers will keep tweaking the code until it passes that check, just like virus writers submit their viruses to VirusTotal until they are undetected.
galaxy_gas|5 months ago
unknown|5 months ago
[deleted]
AtNightWeCode|5 months ago
madeofpalk|5 months ago
hulitu|5 months ago
Because nobody gives a fsck. Normally, after npm was filled with malware, people would avoid it. But it seems that nobody (distro maintainers) cares. People get what they asked for (malware).