TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Opening Pandora's Box – Supply Chain Insider Threats in Open Source Projects

5 pointsby gepeto42about 1 year ago

2 comments

flexoriumabout 1 year ago
When people think about Supply Chain security, they generally think of SBOM and vulnerabilities in your direct and transitive dependencies.<p>But most people are completely blind of vulnerabilities in the Build Pipeline of those same dependencies. The SLSA framework considers those <a href="https:&#x2F;&#x2F;slsa.dev&#x2F;spec&#x2F;v0.1&#x2F;threats#build-integrity-threats" rel="nofollow">https:&#x2F;&#x2F;slsa.dev&#x2F;spec&#x2F;v0.1&#x2F;threats#build-integrity-threats</a> to some extent. And OpenSSF aficionados know, but it&#x27;s still niche.<p>I like to think of those as a parallel universe! An orthogonal plane of vulnerabilities that are beneath the surface and completely independent of vulnerabilities into the source code of the project itself. Basically never tracked as CVEs... Those can be nested deep, deep, in a transitive build dependency 5 levels down.
CitizenJoshabout 1 year ago
What are the minimal traces left if the hacker deletes the GitHub Actions logs?
评论 #39719300 未加载