TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: npm install actual-malware

55 点作者 lhmiles大约 3 年前
Our package registry ecosystem has a serious problem... and not just npm.<p>People are aware of this but maybe this will make them a bit more aware

6 条评论

ivraatiems大约 3 年前
This is a clever way to raise important issues in security of package managers, but I can&#x27;t find support for your claim that NPM doesn&#x27;t let you report malware. A cursory google search brought me this: <a href="https:&#x2F;&#x2F;docs.npmjs.com&#x2F;reporting-malware-in-an-npm-package" rel="nofollow">https:&#x2F;&#x2F;docs.npmjs.com&#x2F;reporting-malware-in-an-npm-package</a><p>And I confirmed that that button is indeed available on packages with a link that goes to eg <a href="https:&#x2F;&#x2F;www.npmjs.com&#x2F;support?inquire=security&amp;security-inquire=malware&amp;package=left-pad&amp;version=1.3.0" rel="nofollow">https:&#x2F;&#x2F;www.npmjs.com&#x2F;support?inquire=security&amp;security-inqu...</a><p>What functionality was removed?
评论 #30690375 未加载
评论 #30683826 未加载
GekkePrutser大约 3 年前
Yep I&#x27;ve been trying to get our company to pay more attention to it. It&#x27;s not just nodejs. All the new hipster languages pull in whatever they can grab. Python, golang, Ruby..<p>A lot of this stuff is submitted by random people that have no verified credibility. It&#x27;s really worrying. I&#x27;m sure it&#x27;ll take another major incident though before we&#x27;ll really pay attention to it. Like wanna cry&#x2F;notpetya did for SMBv1. Because the devs don&#x27;t want any mitigations, it&#x27;ll make their work more difficult.
jve大约 3 年前
&gt; Put passphrases on all your private keys. If you&#x27;re a package maintainer then stay logged-out of your accounts on npm, github, etc, at least in the CLI.<p>Doesn&#x27;t help when burglar is already in your house.
zeroimpl大约 3 年前
I get npm, but is it that realistic that yum will pull down a virus? If yum could be infected, then you are either pulling down obscure packages or using a 3rd party repository. If a mainstream package could get infected, it’s just as likely to end up in the base image that you started with (ISO, docker container, etc).
cookiengineer大约 3 年前
This is why it&#x27;s important to use containers for development - or at least SELinux on your development host machine.<p>Simply restrict file access of npm to its cache folders, so it cannot access your other user configuration files.<p>Use additionally a host firewall like opensnitch to block npm from any other host than npmjs.com.
评论 #30713512 未加载
kjok大约 3 年前
&gt; Can&#x27;t this be detected? Not really.<p>Contrary to OP belief, there are tools that claim to detect such malicious packages. I wonder how effective they are.
评论 #30738626 未加载