TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Opening Pandora's Box – Supply Chain Insider Threats in Open Source Projects

5 点作者 gepeto42大约 1 年前

2 条评论

flexorium大约 1 年前
When people think about Supply Chain security, they generally think of SBOM and vulnerabilities in your direct and transitive dependencies.<p>But most people are completely blind of vulnerabilities in the Build Pipeline of those same dependencies. The SLSA framework considers those <a href="https:&#x2F;&#x2F;slsa.dev&#x2F;spec&#x2F;v0.1&#x2F;threats#build-integrity-threats" rel="nofollow">https:&#x2F;&#x2F;slsa.dev&#x2F;spec&#x2F;v0.1&#x2F;threats#build-integrity-threats</a> to some extent. And OpenSSF aficionados know, but it&#x27;s still niche.<p>I like to think of those as a parallel universe! An orthogonal plane of vulnerabilities that are beneath the surface and completely independent of vulnerabilities into the source code of the project itself. Basically never tracked as CVEs... Those can be nested deep, deep, in a transitive build dependency 5 levels down.
CitizenJosh大约 1 年前
What are the minimal traces left if the hacker deletes the GitHub Actions logs?
评论 #39719300 未加载