Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

On the flip-side how is someone who's using a package from one of these repository meant to validate that it's secure and non-malicious?

without central validation, each user would have to do it, and that's frankly impractical...

The alternative is that no-one actually does the validation and runs the risk of insecure or malicious packages. To me, that's totally fine as long as they're doing it knowingly, however I'd suggest that most companies making use of NPM, PyPI, Rubygems etc are not doing it knowingly...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: