logoalt Hacker News

ting0yesterday at 7:11 PM1 replyview on HN

And easily bypassed by an attacker who knows about your static analysis tool who can iterate on their exploit until it no longer gets flagged.


Replies

fernandotakaiyesterday at 8:32 PM

the main things are:

1. pin dependencies with sha signatures 2. mirror your dependencies 3. only update when truly necessary 4. at first, run everything in a sandbox.