Manifest confusion issues in NPM packages which could raise malware distribution risk could be discovered by a new Python-based tool developed by sysadmin Felix Pankratz, reports BleepingComputer.
New packages' manifest data could be altered by threat actors to remove dependencies so as not to appear in the NPM registry but would still be executed upon the installation of the package, which may result in cache poisoning, downgrade attacks, and other types of compromise, noted former GitHub and NPM Engineering Manager Darcy Clarke. However, such inconsistencies could be detected by software developers with the new tool, which could be used after installing PIP Python package manager with "pip install -r requirements.txt."
Inspections to determine any mismatches could then be performed by inputting the package name as the script's initial argument. Developers could also conduct inspections in bulk by adding the packages to a single "packages.list" file and leveraging the "check_packages.sh" wrapper script.
Cloud Security, Endpoint/Device Security
Manifest confusion in NPM packages identified by novel tool
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds