Security Considerations in the Open Source Software Ecosystem
Dominik Wermke
de factonot protected
[A]n unauthorized third party leveraged malware deployed to a CircleCI engineer’s laptop in order to steal a valid, 2FA-backed SSO session.
Open Source code appears as
Respectfully, I am no longer going to support Fortune 500s ( and other smaller sized companies ) with my free work.
There isn't much else to say.
Take this as an opportunity to send me a six figure yearly contract or fork the project and have someone else work on it.
Always Contribute Back
We do use internal mirrors mainly for speed and convenience, especially large codebases. [...]
Usually, when we clone from those internal repositories, we’re going to use fixed commits from it, so it makes development a lot easier
To what extent should one trust a statement that a program is free of Trojan horses?
Perhaps it is more important to trust the people who wrote the software.
[T]here’s definitely been people that have intentionally tried to put malicious code in projects, but it’s always very easy to spot immediately. It’s like those spam emails where they have bad grammar and stuff
Somebody would have to write the guide, and I am the only one who can write it. I mean, there is nobody paid to write it and I am also not paid to write it.
always contribute back