You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 9, 2020. It is now read-only.
To date, we've generally deferred the harder security questions in the interest of figuring out what we actually want the tool to be. With the basic vision now settled, security is now at the forefront of our considerations.
To start, we need to articulate a security model for dep; this is just a stub/sketch to get us started.
The essential task of a dependency management system is to select and reproduce a dependency set. Selection should avoid versions of code known to have vulnerabilities, and reproduction should be byte-level precise.
In functional terms, this means a few things:
Verifying the integrity of code on disk against an expected hash digest (related: Vendor pruning #120)
Verifying the authenticity of code retrieved from a source over the public internet
Tracking security issues with and black-listing of released versions (more or less Security service #176)
We needn't necessarily ship a security service as part of 1.9 - speccing and prototyping it is probably sufficient.
ChrisMcKenzie, xor-gate, titanous, j0npulsifer and lotif