Github  Printable

Malicious Third-Party Code

Most open-source developers work in good faith to provide useful tools to the larger community of developers but

  • Passwords are easy to guess, so attackers can suborn accounts that are only protected by a password. On GitHub, developers may configure their accounts to require a second factor but this is not yet the norm.
  • Pull requests that aren't thoroughly reviewed may dilute security properties.
  • Phishing requests targeted at GitHub users (details) can execute code on unwary committers' machines.
  • A pull request may appear to come from a higher-reputation source (details).

Malicious code can appear in the server-side JavaScript running in production, or can take the form of install hooks that run on a developer workstation with access to local repositories and to writable elements of $PATH.

Projects that deploy the latest version of a dependency straight to production are more vulnerable to malicious code. If an attacker manages to publish a version with malicious code which is quickly discovered, it affects projects that deploy during that short "window of vulnerability." Projects that npm install the latest version straight to production are more likely to fall in that window than projects that cherrypick versions or that shrinkwrap to make sure that their development versions match deployed versions.

Bower is deprecated so our discussions focus on npmjs.org, but it's worth noting that Bower has a single-point of failure. Anyone who can create a release branch can commit and publish a new version.

npm profile allows requiring two factor auth for publishing and privilege changes. If the npm accounts that can publish new versions of a package only checkout code from a GitHub account all of whose committers use two factors, then there is no single password that can compromise the system.

The frequency of malicious code vulnerabilities affecting Node.js is probably roughly the same as that for other public module repositories. The npm repo has been a target in the past 1 2.

The npm Blog explains what to do if you believe you have found malicious code:

On August 1, a user notified us via Twitter that a package with a name very similar to the popular cross-env package was sending environment variables from its installation context out to npm.hacktask.net. We investigated this report immediately and took action to remove the package. Further investigation led us to remove about 40 packages in total.

...

Please do reach out to us immediately if you find malware on the registry. The best way to do so is by sending email to security@npmjs.com. We will act to clean up the problem and find related problems if we can.

results matching ""

    No results matching ""