TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Taxonomy of Attacks on Open-Source Software Supply Chains

7 pointsby manesiozabout 3 years ago

1 comment

nonrandomstringabout 3 years ago
A good taxonomy and attempt to make terminology common. Even if it doesn&#x27;t gel structurally the set of attack&#x2F;threat trees is a good first checklist for any open source project wanting to think about opsec&#x2F;infosec.<p>One wonders if the FSF, OSI are on to this and doing much to facilitate good practice for new projects, like best practice git setup, vetting of maintainers, multi-party authentication for builds, secure endpoints&#x2F;host hardening. Or will we just leave it to the &quot;many-eyes&quot; (fingers crossed) system?<p>Otherwise developers might start to assume the veneer of &quot;security&quot; offered by Microsoft&#x27;s GitHub in some way underwrites project integrity (when one should probably trust it about as far as you can comfortably spit out a rat), and most of the weaknesses will happen in the surrounding infrastructure&#x2F;workflow anyway.