(no title)
darkamaul | 3 months ago
I'd argue automated dependency updates pose a greater risk than one-day exploits, though I don't have data to back that up. That's harder to undo a compromised package already in thousands of lock files, than to manually patch a already exploited vulnerability in your dependencies.
[0] https://blog.yossarian.net/2025/11/21/We-should-all-be-using...
plomme|3 months ago
skybrian|3 months ago
A cooldown is a good idea, though.
jonfw|3 months ago
bigstrat2003|3 months ago
kunley|3 months ago
Indeed there are people doing that and communities with a consensus such approach makes sense, or at least is not frowned upon. (Hi, Gophers)
SkyPuncher|3 months ago
tim1994|3 months ago
hinkley|3 months ago
We had so many distinct packages on my last project that I had to massively upgrade a tool a coworker started to track the dependency tree so people stopped being afraid of the release process.
I could not think of any way to make lock files not be the absolute worst thing about our entire dev and release process, so the handful of deployables had a lockfile each that was only utilized to do hotfix releases without changing the dep tree out from underneath us. Artifactory helps only a little here.
yupyupyups|3 months ago
Also, some software are always buggy and every version is a mixed bag of new features, bugs and regressions. It could be due to the complexity of the problem the software is trying to solve, or because it's just not written well.
parliament32|3 months ago
Sparkle-san|3 months ago
unknown|3 months ago
[deleted]
jacquesm|3 months ago
falcor84|3 months ago
woodruffw|3 months ago
(This may end up not being true, in which case a lot of people are paying security vendors a lot of money to essentially regurgitate vulnerability feeds at them.)
nine_k|3 months ago
bootsmann|3 months ago
vintagedave|3 months ago
Until no-one does, for a week. To stretch the original metaphor, instead of an overgrazed pasture, we grow a communally untended thicket which may or may not have snakes when we finally enter.
Ygg2|3 months ago
I guess the latter point depends on how are Shai-Huluds detected. If they are discovered by downstreams of libraries, or worse users, then it will do nothing.
__s|3 months ago
wavemode|3 months ago
That would be a level of mass participation yet unseen by mankind (in anything, much less something as subjective as software development). I think we're fine.
hyperpape|3 months ago
And in the cases where you have vulnerable dependencies, you'd force update them before the cooldown period had expired, while leaving everything else you can in place.
collinmanderson|3 months ago
https://github.com/astral-sh/uv/issues/14992
Sammi|3 months ago
https://www.npmjs.com/package/npm-check-updates#cooldown
In one command:
tragiclos|3 months ago
> Note that previous stable versions will not be suggested. The package will be completely ignored if its latest published version is within the cooldown period.
Seems like a big drawback to this approach.