New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Private NPM appearing as malware in public repo #425
Comments
|
I believe I understand because I saw a similar situation. You got the alert now because they kicked off an effort to publish advisories for malware packages yesterday. https://github.blog/2022-06-15-github-now-publishes-malware-advisories-in-the-github-advisory-database/ |
|
We are NOT using a local package, we ARE using our own internal scope. Please do not copy&paste replies for people without reading their write ups. What is occurring is we are getting alerts for a public NPM of the same name, despite the fact our configuration and Registering our own internal scopes and package names on the public registry to prevent bad actors from using them is not feasible. So the question is: why is Thank you for your time. |
|
@HarlowIBM you should not be using an internal scope that you do not ALSO own on the public registry, for reasons like this, as well as supply chain attacks. I do agree that |
Greetings, I see a large influx of similar issues like this so sorry for only on to the pile.
It looks like a private, and only internally used
npmpackage we have called@ibm-pipeline/loggingis not only published in the public registry, but it is also being flagged as malware.As far as I can tell, our team had nothing to do with this and it very well could be a bad actor that published the public package of the same name.
However, our local
.npmrcandpackage-lock.jsonfiles are configured to pull absolutely everything from our private npm registry, so I'm perplexed as to why runningnpm auditpulls up the alert for the public package as that isn't what we're installing and not how I understoodauditto work.Links:
GHSA-g4xx-7vwp-pq9p
https://www.npmjs.com/package/@ibm-pipeline/logging
Output:
Is this a false positive, or something we should be concerned about?
I'm especially curious about
npm auditpointing to the public package despite the local configurations.Thanks in advance for your time.
The text was updated successfully, but these errors were encountered: