Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduction of a supply chain attack #10

Closed
earonesty opened this issue Feb 13, 2024 · 2 comments
Closed

Introduction of a supply chain attack #10

earonesty opened this issue Feb 13, 2024 · 2 comments

Comments

@earonesty
Copy link

changing this in a program that has no deps:

subprocess.run(
["ls], cwd=build_temp, check=True
)

to a security module and a requirements.txt requirement with no ---hash

means that we have strictly made things less secure.

i think

  1. if there no variables used in the subprocess call, then probably, it's better not to introduce a new dependency
  2. anytime when adding to requirements.txt, include the --hash sha256:... command, to make it harder to attack
@drdavella
Copy link
Member

Hi @earonesty thanks so much for your feedback.

First of all, correct me if I'm wrong, but I'm assuming this change was introduced by @pixeebot? If so, and if it was in a public repository, would you mind sharing a link to the PR?

To address your specific comments:

@drdavella
Copy link
Member

Closing this issue since the items raised here are really related to the behavior of https://github.com/pixee/codemodder-python. Please see the linked issues and join the discussion there.

Thanks again for your feedback.

@drdavella drdavella closed this as not planned Won't fix, can't repro, duplicate, stale Feb 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants