Главная
Study mode:
on
1
Intro
2
JavaScript and npm
3
eslint Incident
4
Key Findings
5
Particularities of npm
6
Empirical Study
7
Experimental Setup
8
Evolution of Package Reach
9
Evolution of Maintainer Influence
10
Evolution of Security Advisories
11
Potential Mitigations
12
Code Vetting as Mitigation
13
Conclusions
14
Evolution of Dependencies
Description:
Explore a comprehensive analysis of security threats in the npm ecosystem through this 21-minute conference talk from USENIX Security '19. Delve into the potential risks associated with the open nature of npm, including the impact of single packages on millions of computers and the influence of individual maintainers. Examine the systematic study of package dependencies, maintainer responsibilities, and publicly reported security issues. Discover key findings on the potential for running vulnerable or malicious code due to third-party dependencies, and learn about the increasing problem of maintainer account vulnerabilities. Investigate the challenges of accidentally using vulnerable code due to lack of maintenance, even years after vulnerabilities become public. Consider proposed mitigation techniques, such as trusted maintainers and total first-party security, and evaluate their potential effectiveness in addressing npm's single points of failure and the threat of unmaintained packages to large code bases. Read more

Small World with High Risks - A Study of Security Threats in the npm Ecosystem

USENIX
Add to list
0:00 / 0:00