You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the past couple of years, pretty much all big package repositories were attacked by malware squatting on common typos of popular packages. I can look up the publication describing some proof-of-concept attacks on NPM in a bit.
We should at least have a note regarding this problem in there, instead of the blanket "users need to make sure they trust the source".
The text was updated successfully, but these errors were encountered:
Interesting thought, thanks! I wonder if this is such an issue with bioconda. Compared to Pypi, it is not easy to upload things here. People need to pass the tests (ok, doable) and the human review (this could detect it). So in the paper, we could say we are aware of the issue and we think we are less vulnerable to this than approaches like pypi. However, we intend to further improve the situation with a detection mechanism in the future.
In the past couple of years, pretty much all big package repositories were attacked by malware squatting on common typos of popular packages. I can look up the publication describing some proof-of-concept attacks on NPM in a bit.
We should at least have a note regarding this problem in there, instead of the blanket "users need to make sure they trust the source".
The text was updated successfully, but these errors were encountered: