• quack@lemmy.zip
      link
      fedilink
      arrow-up
      11
      arrow-down
      2
      ·
      edit-2
      1 day ago

      That doesn’t make you safe from supply chain attacks generally. There’s no reason a supply chain attack couldn’t be applied to software repos you do use if a vulnerability exists within them and a bad actor is sufficiently motivated to exploit it.

      • RustyNova@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        4
        ·
        1 day ago

        Oh definitely. Not saying it’s impossible

        But here it would be arguably harder. Need to first get in the repos, and requires the user to log in to the password vault. Syncthing is easier to compromise, but good luck decrypting the vault