On Sat, Nov 26, 2022 at 02:44:51PM -0000, Curt wrote:
> On 2022-11-25, <to...@tuxteam.de> <to...@tuxteam.de> wrote:
> >
> > If you care about your results, better find ways of, well,
> > auditing your code.
> >
> 
> Are you aware of this?
> 
> https://github.com/advisories/GHSA-97m3-w2cp-4xx6

I don't follow those node messups very closely. But they seem to
be pretty frequent (some of them even quite spectacular, like
the event-stream case):

  https://lwn.net/Articles/773121/

This case is particularly beautiful, because:

 * it was a legit package which was orphaned by the original
   author and taken over by a volunteer "nice enough" to take
   on the burden (harr, harr)

 * the malicious change was targeted at exactly one application
   (Copay). It deployed itself only when "building" that app
   (surprisingly, you kinda "compile" javascript applications
   these days: go figure). So it harks back nicely to Ken
   Thompson's classic "Trusting Trust" article (already mentioned
   in this thread)

As far as I remember the LWN article linked to above, it got
caught before stealing any bitcoin, but just by a slim margin.    

Worth a read.

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to