-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
content: Update mitigation section for the Dependency Confusion threat. #1226
Conversation
Signed-off-by: Meder Kydyraliev <[email protected]>
✅ Deploy Preview for slsa ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
Signed-off-by: Meder Kydyraliev <[email protected]>
@meder we talked about this PR during the SLSA meeting on 11/11/2024. It is my opinion that this would fall in the Dependency Track, not the Build track. The OpenSSF S2C2F already has a requirement (ENF-1) to mitigate against Dependency Confusion attacks. Per the meeting discussion, they said that we should admit that this is hard, and if there are blogs or articles about ways to mitigate against this, we should share them here. So I'm sharing some links below - but again - I think this belongs in the SLSA Dependency Track and we should wait to cover this there.
|
And here's a blogpost on the topic: Defender's Perspective: Dependency Confusion and Typosquatting Attacks. |
Hi all, re: Dependency track: I think it can indeed make it easier to defend against dependency confusion and we can update this page with the new capabilities once that lands. It might be worth agreeing on the purpose of the threats page. Given the current wording on the page I view its purpose as a place to highlight how current SLSA specification can help mitigate common supply chain threats at a high level. At its core dependency confusion is about the lack of verifiable provenance, hence the current wording suggested in this PR. Is this how others view the purpose of this page? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this looks correct to me 👍
@arewm, @trishankatdatadog any objections to merging this? I think we have enough folks, and it's been sitting here for a bit. I'll probably merge by EoY unless you say otherwise. :) |
Er, I meant "end of week" not "end of year"... We can always make further changes as needed. |
Documenting a SLSA-native and build trackccentric mitigation for Dependency Confusion attacks (#1181)
Would love to hear thoughts/opinions on the best way to reflect differing levels of adoption / maturity in native provenance verification across different ecosystems.