Filip Skokan

477 posts

Filip Skokan banner
Filip Skokan

Filip Skokan

@_panva

Identity, OpenID Connect, OAuth 2.0, SSO, Authorization, Authentication, Technical Standards. Node.js core collaborator and TSC member.

Czech Republic Katılım Mart 2019
129 Takip Edilen676 Takipçiler
Sabitlenmiş Tweet
Filip Skokan
Filip Skokan@_panva·
Software's conformance to standards and its certification is not the pinnacle to shoot for. It is the absolute lowest bar.
English
1
2
17
0
Filip Skokan
Filip Skokan@_panva·
When it comes to JWTs issued for "yourself" the JWE format is far superior to JWS. Just let go of the HMAC JWS algorithms and use JWE direct encryption instead. You get confidentiality and it forces use of correct-length keys. await new jose.EncryptJWT > await new jose.SignJWT
Filip Skokan tweet media
English
0
0
3
235
colinhacks/zod
colinhacks/zod@colinhacks·
pro tip: always include `workflow_dispatch` in your workflow triggers this gives you a button inthe GitHub UI to manually trigger fresh runs (when your CI inevitably fails)
colinhacks/zod tweet mediacolinhacks/zod tweet media
English
17
40
610
38.6K
Filip Skokan
Filip Skokan@_panva·
my new project's build script, tsc is then only used to emit declarations and a source map, the published files are index.(js, ts, d.ts(.map))
Filip Skokan tweet media
English
0
0
1
138
Filip Skokan
Filip Skokan@_panva·
Only two more Hybrid PQ/T instances to go. Fully tree-shakeable. Fully typed. All crypto through WebCryptoAPI. All official vectors passing.
Filip Skokan tweet media
English
0
0
2
118
Filip Skokan
Filip Skokan@_panva·
I've been hammering on a new, 0 dependency, runtime-native-only crypto, module that runs everywhere*. Hard to Predict, Keeps everything Encrypted.
English
1
0
8
974
Filip Skokan
Filip Skokan@_panva·
@feross is there a list of detected typosquatted malicious packages?
English
0
0
0
76
Filip Skokan
Filip Skokan@_panva·
@matteocollina @CVEnew Had GitHub staff from the Secure Open Source Fund who are on the CVE board look into it weeks ago. The resolution as disputed is final as per the "process" and cannot change to rejected. Despite it being factually incorrect. No appeal.
English
1
0
1
131
Matteo Collina
Matteo Collina@matteocollina·
@_panva @CVEnew All of that happened to me last week. The only safe way for an OSS project is to be its own CNA or affiliate to a friendly CNA somehow.
English
1
0
1
69
Filip Skokan
Filip Skokan@_panva·
3 private vulnerability disclosures this week. All AI assisted slop that at first glance seems plausable but when challenged quotes non-existent language from RFCs. Time being wasted. Disclosures invalid.
English
2
1
17
3K
Filip Skokan
Filip Skokan@_panva·
Now i get private vulnerability disclosures about CVEs that should've never been assigned, that I rejected, and that are invalid for which i can provide proof.
English
1
0
3
246
Filip Skokan
Filip Skokan@_panva·
💬 It's partly because of @balazsorban44's projects' needs and the poor state of Vercel Edge Runtime Node compat at the time that we now have jose, openid-client, and oauth4webapi with no dependencies entirely built on top of Web Platform APIs such as Fetch and Web Cryptography.
Balázs Orbán@balazsorban44

This is a bittersweet moment, but given the time and energy I've been able to dedicate to the project lately, it feels like the right decision I followed @bekacru from the start and I think he is the right person to trust with Auth.js I am officially no longer the maintainer

English
0
0
2
707
Artem Zakharchenko
Artem Zakharchenko@kettanaito·
@_panva @npmjs You have a far bigger chance of reaching out to the authors of those packages and asking for the name.
English
1
0
1
55
Filip Skokan
Filip Skokan@_panva·
The @npmjs name dispute process does not work anymore. It used to but no longer does. I have 3 npm pkg name claim disputes open for package names that see no downloads or activity since more than a decade ago. Tickets open for over a year with no response.
English
2
0
9
728