TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Investigating a backdoored PyPI package targeting FastAPI applications

141 点作者 ecares超过 2 年前

7 条评论

nisegami超过 2 年前
Some thoughts:<p>1. The blast radius appears to be very minimal, the affected github package has 0 stars, 2 contributers, 1 watcher and 4 issues total.<p>2. The issue was caught and resolved quickly (within a day?).<p>3. I haven&#x27;t seen any explanation by the developer on whether there account was compromised?
评论 #33730519 未加载
IAmGraydon超过 2 年前
The author worked in Belarus for Wargaming.net until just before making this commit. Wargaming recently withdrew their operations from Belarus and Russia for obvious reasons, and the author appears to have lost his job with them as a result. Combined with the way he nonchalantly reversed the commit and I’m thinking the theory on r&#x2F;netsec may not be so far fetched.
评论 #33731780 未加载
oefrha超过 2 年前
According to <a href="https:&#x2F;&#x2F;pypistats.org&#x2F;packages&#x2F;fastapi-toolkit" rel="nofollow">https:&#x2F;&#x2F;pypistats.org&#x2F;packages&#x2F;fastapi-toolkit</a>, this package had 158 downloads in total in the past month. This would include automated tools (e.g. this GuardDog mentioned in TFA) grabbing every single package version published.<p>But of course they have to hype it up with &quot;50k stars&quot;, &quot;used by Microsoft, Uber, and Netflix&quot; blah blah, otherwise it&#x27;s a complete non-story.
评论 #33730884 未加载
d1l超过 2 年前
More FUD from attention seeking, for-profit organizations. Even a tiny bit of digging shows this is virtually a non-issue. Look at the gh repo, the pypi stats
denton-scratch超过 2 年前
&gt; a package whose maintainer&#x27;s account was likely compromised by a malicious actor<p>They don&#x27;t say why they think it was an account compromise, rather than a malicious maintainer.
评论 #33730866 未加载
kjok超过 2 年前
Again some esoteric package that likely nobody uses. If you’re worried about such attacks, private registry mirrors can go a long way.
dlor超过 2 年前
The issue from the researchers appears to be here: <a href="https:&#x2F;&#x2F;github.com&#x2F;timaakulich&#x2F;fastapi_toolkit&#x2F;issues&#x2F;4" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;timaakulich&#x2F;fastapi_toolkit&#x2F;issues&#x2F;4</a><p>This is definitely pretty strange. Account takeovers happen, but just reverting the commit and closing the issue after one gets discovered is not the best way to handle these.<p>This is the reality of our modern software development process though. Your threat model now must include the GitHub account of every maintainer of every open source project you use.
评论 #33732303 未加载
评论 #33730717 未加载
评论 #33731751 未加载
评论 #33732070 未加载
评论 #33733040 未加载