• quick_snail@feddit.nl
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    Don’t. Use. Npm.

    That applies to pip and crate and all the other shitty lang package managers that totally fail at security

    • rmrf@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 days ago

      Honestly just fine use computers at all, completely eliminate the remote attack vector. And only drink rain water since city water can be compromised.

      Or, recognize this is a normal part of using software and have more than 1 thing between you and a breach

    • wizzim@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      Unfortunately I have to use node for home project (Jellyfin tizen)

      I was wondering: would it be possible to run node in a sandbox to lower the scope of the attack? (i.e. not compromise my home computer) Or is maybe a full VM a better solution?

        • dieTasse@feddit.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          In case of NPM version pinning is a good practice. But also set it to ignore post install scripts. They are a bad practice and only about 2 % of all packages use it so it is unlikely it will bother you. They, the post install scripts, were used in recent supply chain attacks btw (the axios). You can either set it project wide in .npmrc file, add ignore-scripts=true, that is good for project where multiple people collaborate. And/Or system wide by running npm config set ignore-scripts true for your personal workspace. You can also achieve it by using --ignore-scripts flag during npm install, but that is way too impractical to always think about it. Also I would recommend checking npq, its a wrapper around npm cli that will give you some security summary before installing anything (and it is able to give you warning about post install scripts).

          • captcha_incorrect@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            18 hours ago

            Wait, any package that I download via NPM could potentially have a script that will run unless I set it to false, when I install said package?

            • dieTasse@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              10 hours ago

              Yes, that is exactly how the axios supply chain attack worked… It ran post install script (on dependency) that downloaded malware, ran it and even cleaned it up. Everything on that machine was compromised… It can be any dependency of dependency too, deep down in the tree…

              • captcha_incorrect@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                17 minutes ago

                Hmm. I was going to say that it sounds bonkers what it can run just any script, but at the same time, is it any different from downloading and executhing a binary file?

      • quick_snail@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        A package manager that uses cryptographic signatures. Apt had this since 2005 iirc. Use apt.

          • quick_snail@feddit.nl
            link
            fedilink
            English
            arrow-up
            1
            ·
            17 hours ago

            Oh boy. Maven is like the only language dependency manager that does signing tho!

            You don’t need to use apt for java. Just use maven :)