• stembolts
    link
    fedilink
    arrow-up
    12
    ·
    11 months ago

    It’s not hard to do. What would be hard would be getting it through code review. Like the example provided… how would that ever get through code review for a merge? Must not be a well-protected code base?

    • maynarkh@feddit.nl
      link
      fedilink
      arrow-up
      12
      ·
      11 months ago

      Publish your own package to PyPI that on import does some evil stuff. Name the package something similar to a known, but not too well known package. Supply chain attacks are even less defended against than other stuff.

      All this relies on companies being shit though, but well, we all know that’s the case in a lot of places.

      • MotoAsh@lemmy.world
        link
        fedilink
        arrow-up
        7
        ·
        11 months ago

        Yea… pipeline and dependency auditing isn’t trivial if you want to catch the subtle stuff. Even most of the devs that know how to do it are going to respond with, “above my pay grade…” unless they’re somehow actually getting paid enough to be arsed to do it correctly…