Are we Forever Doomed to Software Supply Chain Security?

Rate this content
Bookmark

The adoption of open-source software continues to grow and creates significant security concerns for everything from software supply chain attacks in language ecosystem registries to cloud-native application security concerns. In this session, we will explore how developers are targeted as a vehicle for malware distribution, how immensely we depend on open-source maintainers to release timely security fixes, and how the race to the cloud creates new security concerns for developers to cope with, as computing resources turn into infrastructure as code.

Liran Tal
Liran Tal
17 min
18 Nov, 2021

Comments

Sign in or register to post your comment.

Video Summary and Transcription

The Talk discusses the importance of software security and the risks associated with open-source software supply chains. It highlights real-world stories of developers' involvement in security incidents and emphasizes the need to trust the software we use. The Talk also addresses the vulnerabilities and targeted attacks that come with the growing dependency on open-source software. It explores the security risks in open-source dependencies, open-source ecosystems, and the future of open source software. Additionally, it provides insights into choosing the best vulnerability scanning software and promoting supply chain security practices.

1. Introduction to Software Supply Chain Risks

Short description:

In this part, I discuss the importance of software security and the risks associated with open-source software supply chains. I share real-world stories of developers' involvement in security incidents and emphasize the need to trust the software we use. Additionally, I highlight the growing dependency on open-source software and the vulnerabilities and targeted attacks that come with it. I also mention Ken Thompson's essay on trusting trust and how developers have been targeted to distribute malicious code. Lastly, I mention the Event Stream incident as an example of a targeted attack on developers in the JavaScript ecosystem.

Hi, everyone, and thank you for joining my talk, Are We Forever Doomed by Software Supply Chain Risks? If you joined this talk, then it means you care about software and you care about software security, which is great. Most of all, you probably are curious, like I am, how does open-source software supply chain risks impact all of us? You, me, everyone here.

So I wanted to begin this with interesting stories, such as, let's take a moment to reflect on this picture, what you're seeing on your screen right now. And what comes to your mind? Is it a futuristic outlook of the world, like the robots? Are they uprising and becoming a key part of our lives? Perhaps it's other things, like how much does the robot actually learn and upload all of that to the cloud? You know, where is it stored? Is it stored safely? What happens when someone can do something malicious with that data? Most of all, what happens if someone hacks in and interacts with my child? This is my kid, if so to say. And what happens when that interaction takes place, when someone is able to compromise that? So, yeah, that's where we are getting started, you know. These are some of the things that are keeping me up at night.

Today I would like to share with you some real-world stories of how developers play a fundamental role in recent and growing security incidents. And also, you know, why should you care about security, software security and software supply chain risks? And also, leave you off to think about who you actually trust.

So, in case you had a doubt, we're seeing more and more open source software being developed. Year after year, right, open source software repositories are growing with more and more open source software and that is more software footprint. The thing is the application that we build are ever-growing in their dependency of open source software, not just the fact that we're using open source software, but the applications themselves are using more and more of that as well. So, more of us, basically, software engineers, are now accustomed to the way of how people work in open source, like opening issues and becoming maintainers of open source. More and more of us are maintainers of open source software and that growth of open source software doesn't come without any risks, right? This is why we're all here, because we care about it.

We are continuously witnessing the growth of open source software security vulnerabilities in these ecosystems, like NPM and Java and others and this could be anything from CVE-based vulnerability reports that when you install a software you get that installation that said, you know, there are 1,000 vulnerabilities there. What happens when that takes place? Also the incidents themselves of malicious packages and different targeted attacks on developers because us as developers, we rely on open source software packages and so we are targeted as well and we'll get to that right now.

Let's rewind back, first of all, in time to get an early glimpse of how one developer perceived the risks of open source software. So in 1984, the Turing Award-winning Ken Thompson wrote a short essay titled, Reflections on Trusting Trust, in which he describes how he added a backdoor to the Unix login C program and then he continued and added a backdoor to the C compiler and then he added a backdoor further on with his chains of attacks into the compiler that compiles the C program, that compiles the compiler. Right, so in his paper here about Reflections on Trusting Trust, he actually explains how software can be taught to learn specific traits and pass them on. So, realistically, it is very, very hard to find the traces of things like Trojan horses and backdoors unless you have actually written everything from scratch. And I mean everything such as the compiler, the linker, the CPU, the display that you're watching something, the keyboard, everything. It is very hard to trust an ecosystem. So as we learned by Thompson's Trojan horse story, this is dating back to 1984, developers have been targeted as a vehicle to distribute malicious backdoors and other sorts of malware for a very long time now.

Let's explore some of these incidents. I'm sure you've probably heard of some of them. In 2018, the JavaScript ecosystem witnessed its first high impact, spearheaded, targeted attack on maintainers and developers alike where they are working in open source in the ecosystem themselves and actually have been the attack target, the vehicle as well to actually distribute malicious JavaScript code to all of us using those software. And so the attack itself targeted also developers using open source, specifically a Bitcoin wallet application. And this was the well-known Event Stream incident. Event Stream existed on the NPM registry since 2011, for a very long time now, as you could see. It's practically didn't receive any new releases in the last two years. But gained millions of downloads per week.

2. Security Risks in Open-Source Dependencies

Short description:

Someone unexpectedly offers to help with a project and opens a pull request. Unbeknownst to the original maintainer, the trusted individual introduces a dependency with a backdoor. The dependency is then included in new versions of the software, compromising its security. This incident occurred with the Event Stream package, resulting in the distribution of a malware-infected Bitcoin wallet application for three months.

Out of the blue someone chimes in and say, I wanna help. They get into the project, they help, they open a pull request as you normally do in open-source software. One of those pull requests later has actually introduced the dependency. At that point in time, this was a trusted individual. So they received a different kind of like access to the repository, and publishing new packages, and new versions of that package, and so on. And later on when they added that dependency, now that dependency exists in a different state, and they could just add that backdoor to that new version that they released. And now new versions of Event Stream that use that dependency pull that, the new version in, and they get that dependency with the backdoor that now the original maintainer of Event Stream did not know about. They did not know that this is happening and they can't control it. Because this is how software package managers work in specific ecosystems like NPM, like others. So this actually resulted in two versions of the copy Bitcoin wallet application, including the malware, three months. For three months until we found this, this is the Event Stream one.

Check out more articles and videos

We constantly think of articles and videos that might spark Git people interest / skill us up or help building a stellar career

Network Requests with Cypress
TestJS Summit 2021TestJS Summit 2021
33 min
Network Requests with Cypress
Top Content
Whether you're testing your UI or API, Cypress gives you all the tools needed to work with and manage network requests. This intermediate-level task demonstrates how to use the cy.request and cy.intercept commands to execute, spy on, and stub network requests while testing your application in the browser. Learn how the commands work as well as use cases for each, including best practices for testing and mocking your network requests.
Testing Pyramid Makes Little Sense, What We Can Use Instead
TestJS Summit 2021TestJS Summit 2021
38 min
Testing Pyramid Makes Little Sense, What We Can Use Instead
Top Content
Featured Video
Gleb Bahmutov
Roman Sandler
2 authors
The testing pyramid - the canonical shape of tests that defined what types of tests we need to write to make sure the app works - is ... obsolete. In this presentation, Roman Sandler and Gleb Bahmutov argue what the testing shape works better for today's web applications.
Full-Circle Testing With Cypress
TestJS Summit 2022TestJS Summit 2022
27 min
Full-Circle Testing With Cypress
Top Content
Cypress has taken the world by storm by brining an easy to use tool for end to end testing. It’s capabilities have proven to be be useful for creating stable tests for frontend applications. But end to end testing is just a small part of testing efforts. What about your API? What about your components? Well, in my talk I would like to show you how we can start with end-to-end tests, go deeper with component testing and then move up to testing our API, circ
Test Effective Development
TestJS Summit 2021TestJS Summit 2021
31 min
Test Effective Development
Top Content
Developers want to sleep tight knowing they didn't break production. Companies want to be efficient in order to meet their customer needs faster and to gain competitive advantage sooner. We ALL want to be cost effective... or shall I say... TEST EFFECTIVE!But how do we do that?Are the "unit" and "integration" terminology serves us right?Or is it time for a change? When should we use either strategy to maximize our "test effectiveness"?In this talk I'll show you a brand new way to think about cost effective testing with new strategies and new testing terms!It’s time to go DEEPER!
Playwright Test Runner
TestJS Summit 2021TestJS Summit 2021
25 min
Playwright Test Runner
Top Content
Everyone Can Easily Write Tests
TestJS Summit 2023TestJS Summit 2023
21 min
Everyone Can Easily Write Tests
Let’s take a look at how Playwright can help you get your end to end tests written with tools like Codegen that generate tests on user interaction. Let’s explore UI mode for a better developer experience and then go over some tips to make sure you don’t have flakey tests. Then let’s talk about how to get your tests up and running on CI, debugging on CI and scaling using shards.

Workshops on related topic

Designing Effective Tests With React Testing Library
React Summit 2023React Summit 2023
151 min
Designing Effective Tests With React Testing Library
Top Content
Featured Workshop
Josh Justice
Josh Justice
React Testing Library is a great framework for React component tests because there are a lot of questions it answers for you, so you don’t need to worry about those questions. But that doesn’t mean testing is easy. There are still a lot of questions you have to figure out for yourself: How many component tests should you write vs end-to-end tests or lower-level unit tests? How can you test a certain line of code that is tricky to test? And what in the world are you supposed to do about that persistent act() warning?
In this three-hour workshop we’ll introduce React Testing Library along with a mental model for how to think about designing your component tests. This mental model will help you see how to test each bit of logic, whether or not to mock dependencies, and will help improve the design of your components. You’ll walk away with the tools, techniques, and principles you need to implement low-cost, high-value component tests.
Table of contents- The different kinds of React application tests, and where component tests fit in- A mental model for thinking about the inputs and outputs of the components you test- Options for selecting DOM elements to verify and interact with them- The value of mocks and why they shouldn’t be avoided- The challenges with asynchrony in RTL tests and how to handle them
Prerequisites- Familiarity with building applications with React- Basic experience writing automated tests with Jest or another unit testing framework- You do not need any experience with React Testing Library- Machine setup: Node LTS, Yarn
How to Start With Cypress
TestJS Summit 2022TestJS Summit 2022
146 min
How to Start With Cypress
Featured WorkshopFree
Filip Hric
Filip Hric
The web has evolved. Finally, testing has also. Cypress is a modern testing tool that answers the testing needs of modern web applications. It has been gaining a lot of traction in the last couple of years, gaining worldwide popularity. If you have been waiting to learn Cypress, wait no more! Filip Hric will guide you through the first steps on how to start using Cypress and set up a project on your own. The good news is, learning Cypress is incredibly easy. You'll write your first test in no time, and then you'll discover how to write a full end-to-end test for a modern web application. You'll learn the core concepts like retry-ability. Discover how to work and interact with your application and learn how to combine API and UI tests. Throughout this whole workshop, we will write code and do practical exercises. You will leave with a hands-on experience that you can translate to your own project.
Detox 101: How to write stable end-to-end tests for your React Native application
React Summit 2022React Summit 2022
117 min
Detox 101: How to write stable end-to-end tests for your React Native application
Top Content
WorkshopFree
Yevheniia Hlovatska
Yevheniia Hlovatska
Compared to unit testing, end-to-end testing aims to interact with your application just like a real user. And as we all know it can be pretty challenging. Especially when we talk about Mobile applications.
Tests rely on many conditions and are considered to be slow and flaky. On the other hand - end-to-end tests can give the greatest confidence that your app is working. And if done right - can become an amazing tool for boosting developer velocity.
Detox is a gray-box end-to-end testing framework for mobile apps. Developed by Wix to solve the problem of slowness and flakiness and used by React Native itself as its E2E testing tool.
Join me on this workshop to learn how to make your mobile end-to-end tests with Detox rock.
Prerequisites- iOS/Android: MacOS Catalina or newer- Android only: Linux- Install before the workshop
API Testing with Postman Workshop
TestJS Summit 2023TestJS Summit 2023
48 min
API Testing with Postman Workshop
Top Content
WorkshopFree
Pooja Mistry
Pooja Mistry
In the ever-evolving landscape of software development, ensuring the reliability and functionality of APIs has become paramount. "API Testing with Postman" is a comprehensive workshop designed to equip participants with the knowledge and skills needed to excel in API testing using Postman, a powerful tool widely adopted by professionals in the field. This workshop delves into the fundamentals of API testing, progresses to advanced testing techniques, and explores automation, performance testing, and multi-protocol support, providing attendees with a holistic understanding of API testing with Postman.
1. Welcome to Postman- Explaining the Postman User Interface (UI)2. Workspace and Collections Collaboration- Understanding Workspaces and their role in collaboration- Exploring the concept of Collections for organizing and executing API requests3. Introduction to API Testing- Covering the basics of API testing and its significance4. Variable Management- Managing environment, global, and collection variables- Utilizing scripting snippets for dynamic data5. Building Testing Workflows- Creating effective testing workflows for comprehensive testing- Utilizing the Collection Runner for test execution- Introduction to Postbot for automated testing6. Advanced Testing- Contract Testing for ensuring API contracts- Using Mock Servers for effective testing- Maximizing productivity with Collection/Workspace templates- Integration Testing and Regression Testing strategies7. Automation with Postman- Leveraging the Postman CLI for automation- Scheduled Runs for regular testing- Integrating Postman into CI/CD pipelines8. Performance Testing- Demonstrating performance testing capabilities (showing the desktop client)- Synchronizing tests with VS Code for streamlined development9. Exploring Advanced Features - Working with Multiple Protocols: GraphQL, gRPC, and more
Join us for this workshop to unlock the full potential of Postman for API testing, streamline your testing processes, and enhance the quality and reliability of your software. Whether you're a beginner or an experienced tester, this workshop will equip you with the skills needed to excel in API testing with Postman.
Testing Web Applications Using Cypress
TestJS Summit - January, 2021TestJS Summit - January, 2021
173 min
Testing Web Applications Using Cypress
WorkshopFree
Gleb Bahmutov
Gleb Bahmutov
This workshop will teach you the basics of writing useful end-to-end tests using Cypress Test Runner.
We will cover writing tests, covering every application feature, structuring tests, intercepting network requests, and setting up the backend data.
Anyone who knows JavaScript programming language and has NPM installed would be able to follow along.
Best Practices for Writing and Debugging Cypress Tests
TestJS Summit 2023TestJS Summit 2023
148 min
Best Practices for Writing and Debugging Cypress Tests
Workshop
Filip Hric
Filip Hric
You probably know the story. You’ve created a couple of tests, and since you are using Cypress, you’ve done this pretty quickly. Seems like nothing is stopping you, but then – failed test. It wasn’t the app, wasn’t an error, the test was… flaky? Well yes. Test design is important no matter what tool you will use, Cypress included. The good news is that Cypress has a couple of tools behind its belt that can help you out. Join me on my workshop, where I’ll guide you away from the valley of anti-patterns into the fields of evergreen, stable tests. We’ll talk about common mistakes when writing your test as well as debug and unveil underlying problems. All with the goal of avoiding flakiness, and designing stable test.