Advance malicious / broken module detection #243
littledivy
started this conversation in
General
Replies: 2 comments 1 reply
-
This could be integrated well with module scoring, 👍🏻 |
Beta Was this translation helpful? Give feedback.
1 reply
-
analyzer is the repo for this. Converting this to a discussion. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Currently our malicious/broken module detection is manual making it an experience based reporting system i.e we just let the users complain.
Proposal -
Analyze every source file (js/ts) and dependencies in the module source code as and when a new version is published.
How -
It may sound difficult to implement something like this but luckily we have
swc
which makes things very easy for us.swc_ecma_visit
(used bydeno_lint
) we can look for malicious commands that could possibly be executed withDeno.run
, etc and warn users while importing.deno_swc
Where -
This is most likely to be a part of the Rust API but it will be available as a rust crate for other registries to implement.
Why -
No other package registry has any automatic module detection system so we would probably be the first to do this.
Beta Was this translation helpful? Give feedback.
All reactions