Skip to content

security: clerk runs third party posinstall scripts #8540

@shamilovtim

Description

@shamilovtim

Preliminary Checks

Reproduction

n/a

Publishable key

pk_test_123456789

Description

npm postinstall scripts are a significant security risk in the JavaScript ecosystem and are frequently used as an attack vector in supply-chain incidents. Given the current threat landscape, many teams are moving toward blocking or heavily restricting these scripts by default.

Clerk currently uses a postinstall script for telemetry. We do not believe telemetry justifies the security tradeoff of running install-time scripts, especially when users and organizations are actively trying to reduce exposure to this class of risk.

We plan to block these scripts in our environment. For the security of your users, and in recognition of the ongoing risks in the JavaScript ecosystem, we ask that Clerk remove the use of postinstall scripts for telemetry.

Environment

As a security practice I no longer run npx, pnpm dlx or equivalent one off package execution commands on my machine. 

latest macOS, latest clerk SDKs

Metadata

Metadata

Assignees

No one assigned

    Labels

    wontfixThis will not be worked on

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions