Replies: 4 comments 3 replies
-
More than happy to provide a small proof of concept for that one too! |
Beta Was this translation helpful? Give feedback.
-
So I made a small PoC for this, you can download the binary for linux here, and use this gist to try it out. The output looks a little something like this: |
Beta Was this translation helpful? Give feedback.
-
Just came across this proposal to Go for a central vulnerability database: https://go.googlesource.com/proposal/+/master/design/draft-vulndb.md While Deno is very different from Go, they both share some commonality, especially with regards to decentralized package management, so maybe there's some inspiration to be had there. |
Beta Was this translation helpful? Give feedback.
-
Now that we have a lock file, it feels like this could be a matter of simply auditing it. |
Beta Was this translation helpful? Give feedback.
-
I think it would be interesting to have a standard to expose known vulnerabilities of third-party modules in the deno toolchain; A standard way for different registries to notify users that the modules they are importing contain known vulnerabilities. We had a discussion on Discord on the subject, using a header like
X-Deno-Warning
would be a simple solution.My only issue with hijacking the existing
X-Deno-Warning
header is that it gets mixed with other warnings like implicit version resolution. Ideally I think something that can be used to check specifically for vulnerabilities and nothing else would be interesting; it could be used in adeno audit
command for example, which could then be run periodically or in a CI pipeline.How vulnerabilities are submitted and how this header would be populated would be a responsibility for each individual registry.
Related to #5840 and #3654
Beta Was this translation helpful? Give feedback.
All reactions