<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: John Speed Meyers</title>
    <description>The latest articles on DEV Community by John Speed Meyers (@jspeedmeyers).</description>
    <link>https://dev.to/jspeedmeyers</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F573616%2F906e393e-f03b-4fb1-b3cf-c9c1920cd078.jpeg</url>
      <title>DEV Community: John Speed Meyers</title>
      <link>https://dev.to/jspeedmeyers</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jspeedmeyers"/>
    <language>en</language>
    <item>
      <title>Ever npm/pip installed malware? A modest call for action</title>
      <dc:creator>John Speed Meyers</dc:creator>
      <pubDate>Thu, 04 Feb 2021 18:34:21 +0000</pubDate>
      <link>https://dev.to/jspeedmeyers/ever-npm-pip-installed-malware-a-modest-call-for-action-2kfa</link>
      <guid>https://dev.to/jspeedmeyers/ever-npm-pip-installed-malware-a-modest-call-for-action-2kfa</guid>
      <description>&lt;p&gt;The npm and Python Package Index registries that help make Javascript and Python popular, productive, and fun programming languages have over recent years been the victims of malicious attacks. The Python Package Index (PyPI), for instance, has suffered dozens of attacks, including &lt;a href="https://www.iqt.org/bewear-python-typosquatting-is-about-more-than-typos/"&gt;typosquatting attacks&lt;/a&gt; in which an attacker mimics the name of a popular package to trick developers into downloading malware.&lt;/p&gt;

&lt;p&gt;To reduce the number and impact of these attacks on the Javascript and Python ecosystems, concerned developers can take a number of actions. (For a longer list, see this &lt;a href="https://www.iqt.org/toward-secure-code-reuse/"&gt;blog post&lt;/a&gt;.)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Consider contributing your talents to projects that seek to improve the security of these registries. One project worth your attention is &lt;a href="https://github.com/SourceCode-AI/aura"&gt;Aura&lt;/a&gt;, a Python source code auditing and static analysis tool. For those who want to explore Python malware detection challenges identified as important by the Python Software Foundation, see &lt;a href="https://github.com/psf/fundable-packaging-improvements/blob/master/FUNDABLES.md#productionize-malware-detection"&gt;here&lt;/a&gt;. Consider contributing malware checks to the Python Package Index codebase, aka &lt;a href="https://github.com/pypa/warehouse"&gt;Warehouse&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;For those interested in directly identifying malicious packages, you'll need to build registry scanners and then analyze the results, reporting any malware you find. One past effort is &lt;a href="https://www.iqt.org/pypi-scan/"&gt;pypi-scan&lt;/a&gt;, but I'm looking forward to future, more capable scanners in the future!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join the working group meetings of the &lt;a href="https://github.com/ossf"&gt;Open Source Security Foundation&lt;/a&gt;, or OpenSSF. This is a community dedicated to upholding the security of open source software.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Whatever you do, remember that these ecosystems depend on security for their continued health. So consider doing your part!&lt;/p&gt;

</description>
      <category>python</category>
      <category>javascript</category>
      <category>security</category>
      <category>npm</category>
    </item>
  </channel>
</rss>
