JavaScript Jabber cover image

Supply Chain Security - Part 1 - JSJ 524

JavaScript Jabber

00:00

How to Define Trustworthy Authors

You can also take the approach that apple and microsop take, which is ecause we also have to define what scope you're trying to solve for. But even trustworthy authors can turn not trustworthy, like the attack we sawoh, absolutely with merrick a sabbath. Heis own taod. And also, maintainers can lose their passwords, and can get hacked. Their machines can get compromised. O, i'll just quickly summarize it for charles. So there was a maintainer that basically went rogue. The amazon e w s a lie tool was affected by this,. because if you installed it, you would get the latest version of th visguis library

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app