14 pointsby ComCat5 hours ago2 comments
  • ComCat5 hours ago
    I spent months studying how malicious npm packages actually work. Most of them do the same thing eg run a preinstall script, read your .env and credentials, and send them to a remote server. All before your app starts.

    npm install will run this code automatically. No prompt, no warning.

    I built Dependency Guardian a behavioral analysis engine that scans packages for malicious patterns before they touch your system.

    it has: - 26 detectors (shell execution, credential theft, exfiltration, obfuscation, time bombs) - 53 cross-signal amplifiers that correlate findings across detectors - ~2,900 tests across 76 test files - Benchmarked against 11,356 real packages at 99.95% precision

    It would have caught Shai-Hulud, the Chalk/Debug hijack, and the S1ngularity campaign.

    Snyk, Dependabot, and npm audit all missed these because they rely on CVE databases. If there's no CVE filed yet, they're blind. Dependency Guardian reads the actual code.

    curious if anyone here has been exposed/experiences to supply chain attacks and how they handled them

    • sandreas26 minutes ago
      Thanks for sharing.

      I still wonder why this is not an official npm / node effort to better secure the ecosystem...

  • cxcorp22 minutes ago
    How is it different from the established player in the game, Socket.dev?