Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> More useful than reading the code, in most cases, is looking at who's behind the code. Can you identify the author? Do they have an identity and reputation in the space?

That doesn't necessarily help you in the case of supply chains attacks. A large proportion of them are spread through compromised credentials. So even if the author of a package is reputable, you may still get malware through that package.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: