-
Notifications
You must be signed in to change notification settings - Fork 21
Open
Description
This working group has produced a ton of useful information about how best to build a secure package repository, along with data on what repositories are currently doing. Can we crystallize this into an easy-to-digest guide to package repository security for package repository admins/maintainers? Topics would include (by no means complete):
- list of incidents: torchtriton
- guidance on dependency selection: keeping dependency trees trim
- revocation policies
- encouragin best practices
- static/dynamic analysis
- malware scanning: DataDog/guarddog; benchmark; does it help?; IBM Software Fingerprinting for Supply Chain Security Presentation & Feedback #8
- secret scanning (GitHub, GitLab)
- reporting APIs
- security auditing
- for packages (attestations?)
- for the repository itself
- package namespacing
- dependency confusion
- package signing/attestations
- Produce cryptographic signing guide for package managers #10
- TUF, in-toto
- npm/pypi as case studies
- SLSA: provenance
- publish attestations, [Docker attestations](
- https://docs.docker.com/build/attestations/)
- with Sigstore?
- privacy concerns
- publishing workflows ([PyPI trusted publishers](
- https://blog.pypi.org/posts/2023-04-20-introducing-trusted-publishers/))
- API token scoping
- account management
- MFA: SMS vs. TOTP vs. webauthn/passkeys
- domain squatting attacks
- password breach detection
- account recovery
- package manager features
- lockfiles
- reproducible builds
- vulnerability scanning
- SBOMs and package manager ecosystems
- surfacing vulnerabilities to users
(There could also be a good research paper "Systematization of Knowledge" here—CC @joshuagl).
CC @woodruffw
Misc references
trishankatdatadog
Metadata
Metadata
Assignees
Labels
No labels