TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Analysis of supply-chain attack on Ultralytics

98 pointsby SethMLarson5 months ago

9 comments

dlor5 months ago
Really cool to see all the hard work on Trusted Publishing and Sigstore pay off here. As a reminder, these tools were never meant to prevent attacks like this, only to make them easier to detect, harder to hide, and easier to recover from.
评论 #42511179 未加载
ronjouch5 months ago
Good recommendations, including a neat tool to audit your GHAs: <a href="https:&#x2F;&#x2F;github.com&#x2F;woodruffw&#x2F;zizmor">https:&#x2F;&#x2F;github.com&#x2F;woodruffw&#x2F;zizmor</a> , “A static analysis tool for GitHub Actions”.
clbrmbr5 months ago
As a user of PyPI, what’s a best practice to protect against compromised libraries?<p>I fear that freezing the version number is inadequate because attackers (who don’t forget, control the dependency) could change the git tag and redeploy a commonly used version with different code.<p>Is it really viable to use hashes to lock the requirements.txt?
评论 #42418299 未加载
评论 #42418429 未加载
评论 #42441863 未加载
评论 #42418162 未加载
评论 #42418583 未加载
koromak5 months ago
Anyone know of a tool like zizmor for GitLab CI&#x2F;CD? Pretty confident my setup is unsafe after reading through this.<p>Honestly safety in CI&#x2F;CD seems near impossible anyways.
评论 #42441913 未加载
romanows5 months ago
So the Python package `ultralytics` had their GitHub CI&#x2F;CD pipeline compromised which allowed an attack to be inserted and then published on PyPI?
评论 #42418186 未加载
Hilift5 months ago
Sadly, popular open source projects are vulnerable to this vector. A popular package that is adopted by a large vendor (Redhat&#x2F;Microsoft) may see a PR from months or a year ago materialize in their product update pipeline. That is too easy to weaponize so that it doesn&#x27;t manifest until needed or in a different environment.
amelius5 months ago
Question. Are there white-hat hackers out there who pen-test the Python ecosystem on a regular basis?
评论 #42420597 未加载
评论 #42423568 未加载
评论 #42420461 未加载
amelius5 months ago
&gt; What can you do as a publisher to the Python Package Index?<p>Does PyPI rate publishers based on how well they comply to these rules? Can users see which publishers are more reliable than others?
JimmyWilliams15 months ago
I appreciate PyPI&#x27;s transparency and the proactive measures to mitigate future risks. Are there plans to further educate developers on secure workflow practices to prevent similar incidents? This seems like a vital area for community collaboration and awareness.