this post was submitted on 17 May 2026
1 points (100.0% liked)

Security

2084 readers
2 users here now

A community for discussion about cybersecurity, hacking, cybersecurity news, exploits, bounties etc.

Rules :

  1. All instance-wide rules apply.
  2. Keep it totally legal.
  3. Remember the human, be civil.
  4. Be helpful, don't be rude.

Icon base by Delapouite under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] ultimate_worrier@lemmy.dbzer0.com 0 points 6 days ago (1 children)

The solution is simple: stop using Github actions.

[โ€“] Maxxie@piefed.blahaj.zone 0 points 6 days ago (1 children)

Running actions on your own machine doesn't solve cache poisoning or supply chain attacks, your VM will download compromised npm package or github actions the same way GH runner does.

Version pinning/script disabling makes a compromise slightly less likely, rolling your own package server helps a lot (but who got time to maintain version whitelist).

Honestly the best solution is to have minimum amount of dependencies. You don't need a GH action to ping indexers or generic foreign key library for your backed, hammer one yourself.

That and scope all your keys so the leak won't be as devastating ๐Ÿคทโ€โ™€๏ธ

[โ€“] lauha@lemmy.world 0 points 6 days ago (1 children)

Honestly the best solution is to have minimum amount of dependencies.

Isn't this a sane practice in programming anyway? Just don't go overboard with dependency minimalism.

[โ€“] Piatro@programming.dev 0 points 5 days ago (1 children)

Yes but the reality of JavaScript codebases is that you'll typically import hundreds if not thousands of dependencies fairly quickly. Last time I looked at the UI codebase at my job it was sitting at over 40k.

[โ€“] lauha@lemmy.world 0 points 5 days ago

That's one of the reasons) why JS development is the shitshow it is.