Replies: 1 comment 1 reply
-
|
Supply chain attack mitigation for Mason is worth thinking through carefully — Mason's trust model is essentially "download and execute whatever is at this URL", which is the same model as most package managers. Current attack surface:
What Mason currently does for mitigation:
What's harder:
Practical mitigations today:
Longer-term: signing of registry entries with a chain of trust would be the proper solution, similar to what the Go module proxy does. This would require significant infrastructure investment from the Mason maintainers. Is this for personal use security hygiene or organizational compliance requirements? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Does Mason have any options to reduce the risk of supply chain attacks or does it just rely on upstream mechanisms?
For example, in mise I can use the
install_beforesetting to prevent updates until the package has been out for a number of days: https://mise.jdx.dev/configuration/settings.html#install_before. By setting it to7dfor example I give the open-source-o-sphere plenty of time to spot the attacks and pull the code.Thanks.
Beta Was this translation helpful? Give feedback.
All reactions