TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How do you check for malware in OSS packages?

7 点作者 riyakhanna1983将近 6 年前
What tools would you suggest to scan for malicious packages or dependencies?

4 条评论

shoo将近 6 年前
Maybe some ideas here: httpss:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Source_Code_Analysis_Tools<p>At work we use a commercial tool for static analysis. From what I have seen it is rather stupid, it produces a lot of false positive security issues about things like allocating memory (potential resource exhaustion vulnerability...)<p>You also probably want to pin versions of all dependencies, and store them in a repository that you control access to (a good idea for reproducibility, ignoring security).
评论 #20017562 未加载
评论 #20011244 未加载
relaunched将近 6 年前
There are open source tools for CVE checking, which is a good start, there are also commercial alternatives like Whitesource. CSP headers can help. So is only using packages that are actively updated.
riyakhanna1983将近 6 年前
What tools have you been using to scan NPM&#x2F;Python&#x2F;Ruby&#x2F;Go packages for malicious dependencies? How do I know if one of the dependencies in my package is not going to steal my NPM credentials, for example?
avichalp将近 6 年前
If you are looking for something that helps you keep your OSS packages secure, then Snyk[0] is doing an excellent job at it.<p>[0] <a href="https:&#x2F;&#x2F;snyk.io" rel="nofollow">https:&#x2F;&#x2F;snyk.io</a>
评论 #20011231 未加载