TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Malicious libraries can steal all your application secrets in Elixir

42 点作者 pjullrich将近 2 年前

4 条评论

chrisco255将近 2 年前
This is an important thing to be aware of, but this is not unique to Elixir, and the article title does not mention Elixir specifically although the example shown is in Elixir. If you are not careful about your dependency chain, attacks like this could happen in any language. When you pull code in and run it in your app, you are trusting it as if you wrote it yourself.
评论 #36829596 未加载
NovemberWhiskey将近 2 年前
Is there something about Elixir that makes this surprising? Otherwise, the insight that code that forms part of an application has access to the application state is not exactly very deep.
ashishbijlani将近 2 年前
Plug: I&#x27;ve been building Packj [1] to detect dummy, malicious, abandoned, typo-squatting, and other &quot;risky&quot; packages. It carries out static&#x2F;dynamic&#x2F;metadata analysis and scans for 40+ attributes such as num funcs&#x2F;files, spawning of shell, use of SSH keys, network communication, use of decode+eval, mismatch of GitHub code vs packaged code (provenance), change in APIs across versions, etc. to flag risky packages.<p>1. <a href="https:&#x2F;&#x2F;github.com&#x2F;ossillate-inc&#x2F;packj">https:&#x2F;&#x2F;github.com&#x2F;ossillate-inc&#x2F;packj</a>
1letterunixname将近 2 年前
<i>in any language</i><p>The subject matter and title unfairly single-out Elixir.