It would be excellent, but not trivial, to wrap all smoke tests in some sort of security policy.

In the example below, this wrapper would look for attempts to reach out over the network, or ports being opened by the code.

This could be compared to something defined by the author, either via meta files or as part of the testing.

Similarly, examining what the code does on the local system - poking around in /etc or something. Like an apparmour / selinux type of thing.


Such an initiative would be extremely proactive and likely bring wide praise.


Dean


On 6/4/19 1:32 pm, Alceu Rodrigues de Freitas Junior via cpan-testers-discuss wrote:

Hello guys,

Did you have the chance to read about this backdoor found in a popular Ruby gem?

https://www.zdnet.com/article/backdoor-code-found-in-popular-bootstrap-sass-ruby-library/

I was wandering if there is anything we could do to avoid having the same thing happening. Of course, there is very little we could do if something like that happened at the code repository, but there are at least two things we could try:

1 - Start using something like Module::Signature

2 - Fix the PAUSE TLS certificate:

Not sure if you're getting the same, but I just upgraded Firefox on this Ubuntu 18.04 machine before hitting to PAUSE.

Regards,

Alceu



Reply via email to