Malware researcher access to removed malicious NPMs #173836
Replies: 3 comments 1 reply
-
|
What does already exist npm-follower / dependencies.science For example: Between July 2022 and May 2023, over 330,000 versions of packages were deleted from the live npm registry, but npm-follower had already archived ~281,858 of those deleted versions. Pros: Researchers can access removed/ deleted code. npm’s unpublish policy & deprecation tools Limitations / Gaps No authenticated / controlled access to removed versions Latency & completeness Policy constraints Potential legal / security / liability issues What a good mechanism could look like Here’s a sketch for how I think a “quarantine + authenticated researcher access” mechanism could work (so we’re not just talking hypotheticals): Definition of “malicious version” Quarantine storage Authenticated / Vetted researcher access Audit & logging Retention policy / legal guardrails Integration with existing datasets Does npm or any registry plan something like this? As far as public info goes: I haven’t seen npm formally announce a quarantine + authenticated researcher portal for removed/malicious packages. The public dataset (npm-follower) is the closest existing thing. There are community or researcher tools, but they don’t provide controlled access to malicious code only for vetted parties. My take: Should this be done (and can it be)? Yes, I strongly think it's worthwhile. These supply chain attacks are getting more frequent, so having a controlled, trustworthy way for researchers to examine malicious versions (after removal) helps with faster detection, signature creation, remediation, etc. It can be done. Npm (or whichever registry) has the technical ability: storing tarballs + metadata, access control, etc. The harder parts are policy, legal, risk, and who vets researchers. But those are solvable with proper governance. |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
|
🕒 Discussion Activity Reminder 🕒 This Discussion has been labeled as dormant by an automated system for having no activity in the last 60 days. Please consider one the following actions: 1️⃣ Close as Out of Date: If the topic is no longer relevant, close the Discussion as 2️⃣ Provide More Information: Share additional details or context — or let the community know if you've found a solution on your own. 3️⃣ Mark a Reply as Answer: If your question has been answered by a reply, mark the most helpful reply as the solution. Note: This dormant notification will only apply to Discussions with the Thank you for helping bring this Discussion to a resolution! 💬 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Question
Body
Question inspired by the recent S1gularity, Chalk etc., and Shai-Hulud events, where NPM packages had malicious code included.
The malicious versions were removed quickly from the live registry in order to reduce impact. Which is great, and as it should be.
I'm requesting a mechanism for malware researchers to be able to access the removed NPMs. Does such a mechanism already exist? And if not, could that be done as part of the removal process? If it would be created from scratch, it should be authenticated access (so that anonymous access is not available, which would otherwise make it another malware hosting mechanism). Possibly with vetted access, if desired. Example: authenticated access to a quarantine portion of the registry.
Alternately, existing malware sample repository sites exist, such as Malware Bazaar, Hybrid Analysis, and VX Underground. Samples could simply be uploaded to those.
Beta Was this translation helpful? Give feedback.
All reactions