• atrielienz@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      1 day ago

      For a small window of time if you downloaded an update it had malware. It also looks like a lot of those downloads were bot downloads. There is no evidence that vaults have been compromised.

      In a post on X, JFrog said the rogue version of the package “steals GitHub/npm tokens, .ssh, .env, shell history, GitHub Actions and cloud secrets, then exfiltrates the data to private domains and as GitHub commits.”

      • RustyNova@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        2
        ·
        1 day ago

        Of what app? Keepass? Was from the Debian repos. Syncthing what’s from the syncthing repos

            • quack@lemmy.zip
              link
              fedilink
              arrow-up
              11
              arrow-down
              2
              ·
              edit-2
              1 day ago

              That doesn’t make you safe from supply chain attacks generally. There’s no reason a supply chain attack couldn’t be applied to software repos you do use if a vulnerability exists within them and a bad actor is sufficiently motivated to exploit it.

              • RustyNova@lemmy.world
                link
                fedilink
                arrow-up
                1
                arrow-down
                4
                ·
                1 day ago

                Oh definitely. Not saying it’s impossible

                But here it would be arguably harder. Need to first get in the repos, and requires the user to log in to the password vault. Syncthing is easier to compromise, but good luck decrypting the vault