Feross Aboukhadijeh
Coffee with Developers with Feross Aboukhadijeh of Socket about the xz backdoor
#1about 5 minutes
How the xz backdoor exploited maintainer burnout
The xz attack highlights how maintainer burnout creates opportunities for malicious actors to gain trust and take over critical open source projects.
#2about 4 minutes
A historical parallel with the event-stream NPM hack
The 2017 event-stream hack demonstrates a similar pattern of social engineering and highlights how lucky discoveries often expose these backdoors.
#3about 9 minutes
The growing problem of dependency bloat and rot
Modern package managers encourage massive dependency trees, which often include outdated or unnecessary packages that increase the attack surface.
#4about 10 minutes
Detecting protestware and other malicious behaviors
Automated tooling is essential for detecting malicious code like protestware by analyzing package behavior for suspicious activities like file deletion or network access.
#5about 4 minutes
The critical trade-offs of auto-updating dependencies
While updating dependencies protects against known vulnerabilities, updating too quickly can expose you to new, undiscovered supply chain attacks before the community finds them.
#6about 10 minutes
Taking responsibility for your software supply chain
Developers must take responsibility for their dependencies by using lock files, leveraging analysis tools, and understanding that open source transparency aids discovery but doesn't guarantee immediate safety.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
02:00 MIN
How malicious actors infiltrate open source projects
Reviewing 3rd party library security easily using OpenSSF Scorecard
02:39 MIN
How developers can become malware distribution vehicles
Stranger Danger: Your Java Attack Surface Just Got Bigger
03:36 MIN
Developers as an unintentional malware distribution vehicle
Walking into the era of Supply Chain Risks
05:43 MIN
How attackers exploit developers and packages
Vue3 practical development
06:09 MIN
Human factors in open source supply chain risk
Stranger Danger: Your Java Attack Surface Just Got Bigger
05:49 MIN
Common attacks targeting software developers
Vulnerable VS Code extensions are now at your front door
03:17 MIN
Exploring specific web vulnerabilities and filtering issues
WeAreDevelopers LIVE - Chrome for Sale? Comet - the upcoming perplexity browser Stealing and leaking
01:07 MIN
The critical role of human observation in security
Answering the Million Dollar Question: Why did I Break Production?
Featured Partners
Related Videos
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
Oops! Stories of supply chain shenanigans
Zbyszek Tenerowicz
Hack-Proof The Node.js runtime: The Mechanics and Defense of Path Traversal Attacks
Sonya Moisset
Vulnerable VS Code extensions are now at your front door
Raul Onitza-Klugman & Kirill Efimov
What The Hack is Web App Sec?
Jackie
Security in modern Web Applications - OWASP to the rescue!
Jakub Andrzejewski
Walking into the era of Supply Chain Risks
Vandana Verma
101 Typical Security Pitfalls
Alexander Pirker
Related Articles
View all articles.png?w=240&auto=compress,format)



From learning to earning
Jobs that call for the skills explored in this talk.

Peter Park System GmbH
München, Germany
Senior
Python
Docker
Node.js
JavaScript


doinstruct Software GmbH
Berlin, Germany
Intermediate
Senior
Node.js


doinstruct Software GmbH
Berlin, Germany
Senior
GIT
JavaScript
TypeScript

SYSKRON GmbH
Regensburg, Germany
Intermediate
Senior
.NET
Python
Kubernetes

Speech Processing Solutions
Vienna, Austria
Intermediate
CSS
HTML
JavaScript
TypeScript


Portera
Amsterdam, Netherlands
Intermediate
DevOps
Terraform
Kubernetes
Docker Swarm
Microsoft SQL Server
+1