logoalt Hacker News

fc417fc802last Thursday at 6:37 AM2 repliesview on HN

> lacks a (well-known?) build time code execution vector similar to JS’s install scripts or Python’s setup.py

How is that leveraged by attackers in practice? Naively I would expect the actual issue to be insufficient sandboxing (network access in particular).


Replies

woodruffwlast Thursday at 12:24 PM

All of the recent “Shai-Hulud” attack waves leveraged build-time execution, since it’s a reliable way to actually execute code on a target (unlike putting the payload in the dependency itself, since the dependency’s own code might not run until much later.)

Sandboxing would be a useful layer of defense, but it’s not a trivial one to add to ecosystems where execution on the host is already the norm and assumption.

show 1 reply
immibislast Thursday at 7:20 AM

If the attacker can't run code, does it matter whether they're not running code inside or outside of a sandbox?

show 1 reply