logoalt Hacker News

barrkeltoday at 9:44 AM1 replyview on HN

You specifying the top level hash doesn't do anything to pin transitive dependencies, and as the article points out, transitive dependencies - especially dependencies common to a lot of actions - would be the juciest target for a supply chain attack.


Replies

TrianguloYtoday at 10:08 AM

Ah, I see it now. Thanks!