Dan Lorenc

13.2K posts

Dan Lorenc banner
Dan Lorenc

Dan Lorenc

@lorenc_dan

OSS Supply Chain Security. Founder/CEO/Primary Ariba Admin at https://t.co/sGmuUU9JbG Sigstore: https://t.co/dWKlyYu6kv

The Arena Katılım Mayıs 2014
2K Takip Edilen11.1K Takipçiler
Dan Lorenc
Dan Lorenc@lorenc_dan·
@TurnerNovak I have reached an agreement with Chipotle to either acquire a burrito bowl tomorrow for $17 or to pay them $1 for the work we've done together.
English
1
0
2
67
Dan Lorenc
Dan Lorenc@lorenc_dan·
There's something charming about watching claude build other agents. When you debug prompts and tool calls, you can almost see it empathize with the smaller, weaker agent.
English
0
0
7
533
Dan Lorenc
Dan Lorenc@lorenc_dan·
@feross That's not actually what happened with xz-utils or axios man. It's fine to disagree about the right way to solve this! Keep building man!
English
0
0
4
760
Feross
Feross@feross·
Chainguard's CEO published a post this week arguing that scanners are "working against an adversary that's already beaten them" and that "the Axios attack was pulled hundreds of thousands of times before a single scanner flagged it." This is factually incorrect. Here's the timeline, all publicly verifiable: plain-crypto-js@4.2.1, the malicious payload, was published to npm on March 30 at 23:59 UTC. @SocketSecurity AI flagged it as malicious at 00:05 UTC. Six minutes. The first compromised Axios version wasn't published until 00:21 UTC, 16 minutes after we'd already flagged the attack. All this version did was add a dependency on the package we'd already caught. Socket customers with AI malware blocking enabled had installs blocked automatically during the entire three-hour exposure window. No CVE required. No luck required. This was independently corroborated by Snyk, Huntress, Orca Security, and InfoQ each of whom published their own analyses of the attack. Calling scanning "theater" while getting the facts of the year's biggest scanning success story wrong doesn't strengthen the argument. Scanners and hardened images aren't competing answers. They're complementary layers. The industry needs both. I agree with part of the post's broader argument. The trust model for open source consumption needs work. I've been maintaining npm packages with billions of cumulative downloads for over a decade. I know what's broken. But you don't fix the trust model by dismissing the defenders who are actually catching attacks and protecting the community. When we catch a malicious package, we report it to the registry and get it taken down. That protects every developer, not just our customers. Their proposed alternative, rebuilding packages from source, doesn't address the attacks that actually matter. The Axios attack was a maintainer account compromise that poisoned the source. xz-utils was a malicious maintainer who spent two years building trust and poisoned the source. Building from source just rebuilds these attacks faithfully. The most consequential supply chain attacks walk right through this model. Building from source doesn't stop bad source. And you don't fix this problem by declaring open source dead while your company's entire product is built on top of it. A Harvard study estimated the demand-side value of widely used open source at $8.8 trillion. The people maintaining that infrastructure are mostly unpaid. When they get targeted by nation-state actors, the answer should be to fund, support, and protect them, not warn enterprises away from their packages so you can sell a replacement. Open source is under attack because of how much value it creates. That's an argument for investing in it, not writing its obituary. Back to building.
Feross tweet mediaFeross tweet media
English
3
27
131
18.6K
Dan Lorenc
Dan Lorenc@lorenc_dan·
@GergelyOrosz We do the opposite and just give you safe ones we've built ourselves.
English
0
1
7
558
Gergely Orosz
Gergely Orosz@GergelyOrosz·
What are vendors that offer scanning of PRs or repos to protect against malicious dependencies? I know of Sonar (Advanced Security), Socket .dev, JFrog. What else do you know of or use and what does it do? (At some point, you want more than just pinning an old package version)
English
38
12
133
35.4K
Dan Lorenc
Dan Lorenc@lorenc_dan·
LinkedIn is going to go wild when they hear about this next week: browsergate.eu
English
2
7
23
3.8K
Gergely Orosz
Gergely Orosz@GergelyOrosz·
Supply chain attacks are becoming more frequent, and far more serious. What are sensible practices to protect against these when using Node or Python packages? I assume pinning versions is the bare minimum; for those with security teams / tools: why else do you do / can you do?
Feross@feross

🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.

English
114
49
647
113.7K
Dan Lorenc
Dan Lorenc@lorenc_dan·
@andrew__reed No babe I love your dependencies. The pinned ones scare me.
English
0
0
0
240
Andrew Reed
Andrew Reed@andrew__reed·
Software supply chain is the main event that hasn’t hit mainstream media yet
English
5
1
79
15.2K
Dan Lorenc retweetledi
geoff
geoff@GeoffreyHuntley·
some news; @latentpatterns 🤝 @chainguard_dev Chainguard will provide secure images for the embedded terminals within Latent Patterns. You’ll be able to run Claude code from within your browser. Zero api key provisioning or software installation. It just works, even on a Chromebook, from your browser... Thanks @lorenc_dan 🍻 ps. @chainguard_dev is hiring, and Dan mentioned employees get a near-unlimited budget for tokens...
English
5
3
58
4.9K
Dan Lorenc
Dan Lorenc@lorenc_dan·
Multicloud, my take on Gastown is alive, self-hosting, and cranking. Gastown showed me the future, this is my version of it. Check it out! github.com/dlorenc/multic…
English
12
4
38
7.2K
Dan Lorenc
Dan Lorenc@lorenc_dan·
Send help. I ignored all the instructions and used my Polecats with the Refinery. The Mayor and Deacon reported me to the Witness and the Sheriff is after me.
English
0
0
6
1.8K
Dan Lorenc retweetledi
John Wu
John Wu@topjohnwu·
The recent FFmpeg drama with Google is insane, and I'm surprised that so many people agree with FFmpeg's take on X. Google isn't even demanding FFmpeg's maintainer to fix the security bug. Are we living in a world now that sending LEGITIMATE bug reports is suddenly a sin?
Michael Niedermayer@michael__ni

I am the main developer fixing security issues in FFmpeg. I have fixed over 2700 google oss fuzz issues. I have fixed most of the BIGSLEEP issues. And i disagree with the comments @ffmpeg (Kieran) has made about google. From all companies, google has been the most helpfull & nice

English
57
23
588
61.8K
Dan Lorenc retweetledi
Michael Niedermayer
Michael Niedermayer@michael__ni·
I am the main developer fixing security issues in FFmpeg. I have fixed over 2700 google oss fuzz issues. I have fixed most of the BIGSLEEP issues. And i disagree with the comments @ffmpeg (Kieran) has made about google. From all companies, google has been the most helpfull & nice
English
89
202
4.2K
916.3K
Christopher Price
Christopher Price@chrisprice·
@lorenc_dan @0xE1 Dismissing your insult, which honestly, I hope you change how you discuss things with others. I am still willing to have a discussion with you if you cease and desist that behavior. If not, we should just block each other. x.com/chrisprice/sta…
Christopher Price@chrisprice

AI bug hunting as Microsoft EEE. Embrace - Commit to open source. Extend - Use replaceable FOSS components in your workflow. Extinguish - Release AI hounds to make so many bug reports they cannot innovate before you outfox. Oh hi, @Google.

English
1
0
0
55
Dan Lorenc
Dan Lorenc@lorenc_dan·
Google literally runs a program to pay people to fix bugs in critical OSS projects. Ffmpeg is explicitly in scope. Anyone can just send a fix and fill out a form and get paid. github.com/google/bughunt… This is all so dumb.
English
18
55
1.4K
250.3K