<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mark</title>
    <description>The latest articles on DEV Community by Mark (@m4rk9696).</description>
    <link>https://dev.to/m4rk9696</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F111095%2F1dfbb9f8-2b82-4d88-a552-efa4350aa2fb.png</url>
      <title>DEV Community: Mark</title>
      <link>https://dev.to/m4rk9696</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/m4rk9696"/>
    <language>en</language>
    <item>
      <title>NPM... we all knew this would happen eventually</title>
      <dc:creator>Mark</dc:creator>
      <pubDate>Tue, 27 Nov 2018 14:23:26 +0000</pubDate>
      <link>https://dev.to/m4rk9696/npm-we-all-knew-this-would-happen-eventually-16fl</link>
      <guid>https://dev.to/m4rk9696/npm-we-all-knew-this-would-happen-eventually-16fl</guid>
      <description>&lt;p&gt;I remember reading &lt;a href="https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5"&gt;this article&lt;/a&gt; when it first came you in Medium&lt;/p&gt;

&lt;p&gt;Some highlights from the article&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all.&lt;/p&gt;

&lt;p&gt;Although this is all made up, it worries me that none of this is hard.&lt;/p&gt;

&lt;p&gt;There’s no shortage of smart, nasty people out there, and 580,000 npm packages. It seems to me that the odds are better than even that at least one of those packages has some malicious code in it, and that if it’s done well, you would never even know.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;It's dated to Jan 6 2018, nine months later we have this &lt;br&gt;
&lt;a href="https://github.com/dominictarr/event-stream/issues/116"&gt;I don't know what to say.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This all reminds me of &lt;a href="https://en.wikipedia.org/wiki/Murphy%27s_law"&gt;Murphy's Law&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I know there is already a &lt;a href="https://dev.to/nepeckman/how-do-we-improve-security-in-the-npm-ecosystem-3hmj"&gt;post&lt;/a&gt; discussing about how to improve security, but what worries me the most is how &lt;strong&gt;toxic&lt;/strong&gt; the Github thread became. Quoting them here would get me banned.&lt;/p&gt;

&lt;p&gt;I know this is &lt;strong&gt;a very very serious issue&lt;/strong&gt;, but let's say your new to open-source or coding in general and you finally manage to make a project that is useful to the community. &lt;/p&gt;

&lt;p&gt;One day you open your repository to find ~500 comments, people shouting at how you screwed up big time and you don't know why. That isn't the best community experience.&lt;/p&gt;

&lt;p&gt;I've always thought the &lt;a href="https://opensource.org/licenses/MIT"&gt;MIT license&lt;/a&gt; mentioned that this can happen&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;I personally was using &lt;a href="https://github.com/electron/electron"&gt;Electron&lt;/a&gt; before from &lt;a href="https://dev.to/tux0r"&gt;tux0r&lt;/a&gt; from this community pointed out &lt;a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/"&gt;this&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This makes XSS particularly dangerous, as an attacker's payload can allow do some nasty things such as require in the child_process module and execute system commands on the client-side&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://dev.to/tux0r/comment/6gh3"&gt;Link to the actual comment&lt;/a&gt;, a small shout out thanks&lt;/p&gt;

&lt;p&gt;Big shots do screw up&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/OpenSSL#Notable_vulnerabilities"&gt;OpenSSL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)"&gt;Spectre&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)"&gt;Meltdown&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What pops to my mind is &lt;a href="https://youtu.be/v678Em6qyzk?t=388"&gt;this from Donald Knuth&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Err &lt;br&gt;
and err &lt;br&gt;
and err again &lt;br&gt;
but less &lt;br&gt;
and less &lt;br&gt;
and less&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>discuss</category>
      <category>npm</category>
      <category>security</category>
      <category>javascript</category>
    </item>
  </channel>
</rss>
