Hacker News new | past | comments | ask | show | jobs | submit login
NPM Security: Lessons from the Lottie-Player Attack and Path Forward (medium.com/exaforce)
2 points by pupapaik 3 months ago | hide | past | favorite | 2 comments



Last week's Lottie-Player compromise showed how NPM's lack of mandatory security controls continues to make supply chain attacks effective. While investigating popular JavaScript libraries, I found that most don't leverage NPM's provenance attestation, proper version pinning, or SRI checks.

The concerning patterns I found:

- Major packages (react, lodash, express) don't use NPM provenance - Widespread use of @latest tags in production - Missing SRI checks in CDN deployments - No server-side enforcement of attestation - Client-side tooling lacks verification options


https://github.com/twbs/icons/pull/2077 testing first project with 30m downloads




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: