That still leaves two out of three questions unanswered. Most importantly the last one, which was addressed towards the original complaint.
StarDreamer
- 0 Posts
- 4 Comments
- StarDreamer@lemmy.blahaj.zonetoSelfhosted@lemmy.world•Bitwarden CLI distributed through NPM has been compromised. Bitwarden Statement on Checkmarx Supply Chain Incident.English1·1 day ago
- StarDreamer@lemmy.blahaj.zonetoSelfhosted@lemmy.world•Bitwarden CLI distributed through NPM has been compromised. Bitwarden Statement on Checkmarx Supply Chain Incident.English3·2 days ago
- If your assumption is that X509 is trash, does that mean you hold the same amount of distrust to TLS?
- How do you propose the scaling of key management? Do you have a reasonable alternative to users blindly trusting every single key they come across?
- Back to my original question: what prevents a VSCode extension from stealing a private signing key (as opposed to an API key) and causing the same issues described here?
- StarDreamer@lemmy.blahaj.zonetoSelfhosted@lemmy.world•Bitwarden CLI distributed through NPM has been compromised. Bitwarden Statement on Checkmarx Supply Chain Incident.English6·2 days ago
And how would apt help in this particular case? A supply chain attack can happen with any particular package manager. In this case, the compromised package was detected and mitigated within 93 minutes, affecting a total of ~330 users. Which is a lot better than how a lot of distros handled the xz breach last year.
All reasonably secure package managers (and https) operate on a chain of trust. There is little that can be done if that chain of trust is broken.
Based on this the cause was a malicious VSCode extension that stole credentials that were later used to trigger a deployment CI/CD pipeline. If there’s anything to learn from this, it’s probably to not use VSCode.
What descent? There is no descent. They started at bedrock since the beginning. People should have seen it back then.