Settings

Theme

Supply-chain attack using invisible code hits GitHub and other repositories

arstechnica.com

10 points by tannhaeuser 8 hours ago · 5 comments

Reader

rogual 3 hours ago

Weird article. The author talks about Unicode "public use areas" (which don't exist), clarifies that they're sometimes called "public use access" (a term appearing only in this article) and are invisible while also being used for flags and emojis and also having special meaning to JavaScript interpreters and also representing letters in the "US alphabet".

There's a real vulnerability here but whoever wrote this has no idea what they're talking about.

sigseg1v 6 hours ago

Can anyone recommend any OSS tooling that could be used in something like a GH action workflow to automatically screen for these types of static attacks on code? Seems like something that should be part of an automated review pipeline if it's getting so hard for humans to visually review against this kind of stuff.

  • IneffablePigeon 5 hours ago

    A linter that disallows any code that uses eval in any form seems like a good start to me.

    • sigseg1v 3 hours ago

      What about for languages that allow pretty much anything in identifiers or variables. JS for example. Or bash. Don't need eval to do anything crazy there.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection