Hacker News new | past | comments | ask | show | jobs | submit login

>but anyone running a mirror could hypothetically replace the package with another (potentially malicious) package, leading users to install malicious tooling.

I thought all packages were cryptographically signed, and that the package manager would compare the hashes of artifacts downloaded from mirrors to the hashes listed in the package index (which is also signed). This is not an attack that needs reproducible builds to mitigate.






Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: