PolyFill Vulnerability is WILD

  Рет қаралды 87,985

ThePrimeTime

ThePrimeTime

3 күн бұрын

Recorded live on twitch, GET IN
Article
sansec.io/research/polyfill-s...
By: Sansec Forensics Team
My Stream
/ theprimeagen
Best Way To Support Me
Become a backend engineer. Its my favorite site
boot.dev/?promo=PRIMEYT
This is also the best way to support me is to support yourself becoming a better backend engineer.
MY MAIN YT CHANNEL: Has well edited engineering videos
/ theprimeagen
Discord
/ discord
Have something for me to read or react to?: / theprimeagenreact
Kinesis Advantage 360: bit.ly/Prime-Kinesis
Get production ready SQLite with Turso: turso.tech/deeznuts

Пікірлер: 282
@PledgeBass
@PledgeBass 2 күн бұрын
I'm always shocked that stuff like this isn't wayyy more common with how much of modern software is full of 100s of thousands of lines of code that the software provider didn't even write or likely read.
@Kane0123
@Kane0123 2 күн бұрын
The buyout for open source projects seems like a way underrated vector…
@andrewvalenski921
@andrewvalenski921 2 күн бұрын
You’re assuming it’s not. It can only be reported if it’s identified
@autohmae
@autohmae 2 күн бұрын
It''s because there were lower hanging fruit, but now that things are getting slightly more complicated and because the money involved has increased so much for malware, etc.
@Fiercesoulking
@Fiercesoulking 2 күн бұрын
The webdevelopment space went the last 6-8 years completely insane for the lack of a better word . JS workflows have way too many dependencies which not only open then up for supply attacks from all sides e.g React is not build by a company it which is not a software company for others which means Meta can stop supporting the project any moment they like. This is a house of cards. GraphQL and Firebase and such DBs where you have direkt access from the client side is also a super bad idea we knew that even SQL is not good enough for security we have to pack them into PDOs this is a complete violation of security policies . The REST APIs aren't that bad but RPCs are better when you are inside you own applications REST is for 3th party because in RPC you don't have to care of your types(means you need to care in REST) your own I mentioned this because MS dropped their own C# RPC support. I also heard that React Native has a expo which let you update your Android or iOS iPhone app by bypassing their stores which is also a violation of security policies because they bypass their review process.
@user-pt1kj5uw3b
@user-pt1kj5uw3b 2 күн бұрын
These attacks are probably are just as common as you think.
@orbik_fin
@orbik_fin 2 күн бұрын
Back in the day it was Windows users downloading random executables from the Internet, infecting their PC with malware. Now it's web developers doing the same thing but with other people's machines.
@mks-h
@mks-h Күн бұрын
You mean yesterday?
@3DArea
@3DArea 2 күн бұрын
Prime: I only have node_modules in one thing... ... Prime: Dude, I have clerk? 7:22 Prime: How did I download "The Internet" by having a "types" package!? Software Engineering in 2024, step One: Download The Internet
@WackoMcGoose
@WackoMcGoose Күн бұрын
On 150 floppy discs, too! The first 12 are nothing but pr0n, of course. One disc is dedicated to nothing but millions and billions of emoji, another is just the Google homepage and nothing else, and so on...
@M0du5Pwn3n5
@M0du5Pwn3n5 Күн бұрын
No, step one is to download an orchestration suite that downloads a manifest to compose a fleet of containers so you can run a microservice so you can get syntax highlighting over a socket for some insane reason.
@pukkimi
@pukkimi 2 күн бұрын
I have demanded for over 15 years, that no external resources are linked to any of our sites. I have waited for exactly this kind of an attack, or DNS spoofing attack that could cause the same but not at this scale. Also when you link an external js or css, you are using someone else's resources instead your own and it isn't right and sometimes not even reliable. Too much traffic and the proveder could stop usage depending of the referer of the request.
@JoeStuffzAlt
@JoeStuffzAlt 2 күн бұрын
"We don't want to hire an entry-level developer unless the developer has 5 years of experience". It's an interesting vector. You can get that experience
@Cafuzzler
@Cafuzzler 2 күн бұрын
I still remember when the worst we had to worry about was the color.js dude throwing a fit because he wanted to get paid for making a library all the big tech companies used. Now we've got to worry that disgruntled developers aren't giving control up to foreign intelligence services on a multi-year OP, or just straight up selling it to the highest bidder.
@orbatos
@orbatos 2 күн бұрын
And you think this doesn't affect corporate code? It does.
@Cafuzzler
@Cafuzzler 2 күн бұрын
@@orbatos I'm willing to bet Microsoft can't be bought like that by the Chinese government. Now by the NSA on the other hand...
@j_stach
@j_stach 2 күн бұрын
@@Cafuzzler Lol can't buy what you already have, you mean?
@geliba187
@geliba187 Күн бұрын
Having a Chinese web page doesn’t mean anything, their page actually footer says made in USA. I hate people know nothing and start jumping into conclusions
@Cafuzzler
@Cafuzzler Күн бұрын
@@geliba187 You're right. Just because they have a Chinese site, that doesn't mean they are bad. When they are injecting malware into polyfill.js, then we can conclude they suck dick.
@carljacobs1287
@carljacobs1287 Күн бұрын
I'm working on an embedded product to be used in an industrial setting. They want a basic web based interface. Some of the young engineers wanted to use node + CDNs + all the modern web magic. But I'm old-fashioned and don't trust stuff that's either too large or dynamically downloaded, so used minified versions of the libraries I needed (bootstrap and jquery), and wrote the server side CGI in bash scripts. It all turned out to be shockingly simple to do, and completely side-steps the risk shown in this video.
@Daniel15au
@Daniel15au Күн бұрын
CDNs are fine if you control them (like your own Cloudflare, CloudFront, BunnyCDN, etc account). For an embedded product though, you probably just want to have all the content locally on the system (like you said).
@75hilmar
@75hilmar 2 күн бұрын
FunNull that's some impressive naming right there 😂
@autohmae
@autohmae 2 күн бұрын
And obviously funnel people into using their hacked versions...
@shenrr6802
@shenrr6802 2 күн бұрын
What happened to eslint recently?
@reginaldo8597
@reginaldo8597 2 күн бұрын
I want to know as well.
@bowiemtl
@bowiemtl 2 күн бұрын
Yeah I'm out of the loop lol
@louiskapp
@louiskapp 2 күн бұрын
same lol
@aykutakguen3498
@aykutakguen3498 2 күн бұрын
Wanna know
@ThisAintMyGithub
@ThisAintMyGithub 2 күн бұрын
Same here - did the Primeagen just troll us??? Lol
@Tony-dp1rl
@Tony-dp1rl Күн бұрын
NEVER go to production with code that pulls from a CDN you don't control.
@kaibe5241
@kaibe5241 17 сағат бұрын
Yup, the fact that websites provide this as an option for their libraries is pure insanity.
@federicoreina7732
@federicoreina7732 2 күн бұрын
Prime not fully appreciating the github auctions joke 😭
@kamehameha38
@kamehameha38 2 күн бұрын
Shit had me rolling 🤣
@fraineralex
@fraineralex 2 күн бұрын
wow, I got it now 🤣
@redneckcoder
@redneckcoder 2 күн бұрын
added that questionable domain to my internal blacklist so that none of my devices can inavertantly access it and load it from the cdn. Who cares if anybody's sites break at this point.
@EmberQuill
@EmberQuill Күн бұрын
@@redneckcoder As long as you're not using an ancient, unsupported browser version, blocking the script won't break anything at all.
@theaifam5
@theaifam5 2 күн бұрын
Use checksums to prevent any upstream modifications and setup CSP to load only what you „own“.
@autohmae
@autohmae 2 күн бұрын
Correct, Subresource Integrity supported by 97.25% of all browsers in the wild.
@black-snow
@black-snow Күн бұрын
Yes, please.
@firen777
@firen777 Күн бұрын
The problem is polyfill is dynamically generated based on your browser since that's the whole point of polyfill
@autohmae
@autohmae Күн бұрын
@@firen777 they don't have a base script that loads the browser specific one ?
@firen777
@firen777 Күн бұрын
@@autohmae that leaves me thinking: is it really achievable? The current polyfill implementation, as I understand it, is that the server serves you different versions of JS based on your user-agent. (i.e. returns nothing for a modern browser, but returns missing functions for old ones). Therefore, SRI won't work in this case. If we REALLY wanna go for the "base script" approach so that we can have SRI check, then the base script will probably need to check all the possible UA inside the script, fetch the corresponding script as string, checksum the string as makeshift SRI, then eval the string (holy shit).
@gruntaxeman3740
@gruntaxeman3740 2 күн бұрын
Having tons of dependencies of unaudited code has been known security risk all time. I do have in my projects dependencies but almost all of them I have someone curating them, or they are well funded (like React) rest of the dependencies I do check the code or fork. I generally avoid dependencies.
@tablettablete186
@tablettablete186 2 күн бұрын
I am doing the same, like: - This controls the GPU, the only depency is a NVIDIA lib - This interfaces with Win32 and uses a MS lib
@gruntaxeman3740
@gruntaxeman3740 2 күн бұрын
@@tablettablete186 When writing software that runs in browser, it doesn't necessarily require any dependencies.
@djenntt
@djenntt 2 күн бұрын
“Get backdoored, baby! Let’s go!”
@TheAliceQuo
@TheAliceQuo 2 күн бұрын
Had to personally fix 5 repos at work yesterday because of this. Probably dozens or hundreds more that others had to fix.
@sophiophile
@sophiophile Күн бұрын
I just raised this at work as well. I'm not a security guy tho. If you don't mind explaining, what needs to be done?
@bobster852
@bobster852 Күн бұрын
little bit baffled by all the shock. There has never been a moment in time when JS _wasnt_ full of supply chain attacks. It just depends (see what I did there) on which packages we pay attention to.
@asdfghyter
@asdfghyter 2 күн бұрын
12:18 you can use the integrity attribute with a hash on your script tags to ensure that no-one can change the code under you. pairing that with some good CSP headers will go a long way to protecting your website against various kinds of script injection
@crispybacon1999
@crispybacon1999 Күн бұрын
That's the crazy part about it though. Polyfill is specifically designed to generate the js file for each user, so the integrity attribute can't be used.
@asdfghyter
@asdfghyter Күн бұрын
@@crispybacon1999 yes, but for any other cases you can and should use it. and you could also change the polyfill code to make the JS code responsible for determining which version to use instead of the server doing it based on headers.
@YaroslavFedevych
@YaroslavFedevych 2 күн бұрын
Technically fair, the best kind of fair
@cyberneticbutterfly8506
@cyberneticbutterfly8506 Күн бұрын
There is a kind of metaphor or analogy in security here, to "Progressive Enhancement" in frontend: Teams want no dependencies that add security work. Better to not use the thing that demands more security work unless you have to. Solving the problems with larger vendor dependencies or the only the biggest open source dependencies. But then how can things grow to become big in the first place?
@chupasaurus
@chupasaurus 2 күн бұрын
I've seen more deranged supply chain attacks, like Debian mirror being delisted from project for insertion of a backdoor in a package (all packages are signed by the project hence it was stupid).
@marioprawirosudiro7301
@marioprawirosudiro7301 2 күн бұрын
I still remember when Linux Mint's ISO got compromised...
@pranavtaysheti7858
@pranavtaysheti7858 2 күн бұрын
@@marioprawirosudiro7301that is not stupid. Because sign is checked when downloading from apt not when it’s just copying files from usb to pc.
@marioprawirosudiro7301
@marioprawirosudiro7301 2 күн бұрын
@@pranavtaysheti7858 No, it's not stupid. But then again, I never said it was. My reply was because OP's comment about "deranged supply chain attacks" and "Debian" reminded me of Mint's ISO case.
@pranavtaysheti7858
@pranavtaysheti7858 2 күн бұрын
@@marioprawirosudiro7301 sorry I misinterpreted
@marioprawirosudiro7301
@marioprawirosudiro7301 Күн бұрын
@@pranavtaysheti7858 It's fine. Anyway, back then the incident freaked me out so much because I was a Mint user at the time. This led me to a wild distro hopping, trying to find something good enough to replace Mint. Settled on elementary OS, though the way they "update" made me move again. Plus, I said "they", but it's really just a single person running the entire operation... My Linux machine (an old laptop) is now on openSUSE (Tumbleweed, installed recently, like a week ago). Running pretty well, for a rolling release.
@MrGlitch888
@MrGlitch888 Күн бұрын
I always despised modern js development. Forget trying to attack one site with xss, I’m just gonna buy a popular js library and inject js code to steal all the cookies, all the data, and issue malicious http requests on the user’s behalf for all users on all websites that include my js code in their html page.
@snrd
@snrd Күн бұрын
There are two things that (among others) you can do as a maintainer of a website to prevent this kind of attack from working: Using Subresource Integrity (SRI) and defining a Content Security Policy (CSP) either in html or in the http header. Sadly most websites don't use these features and browsers don't require these features to be used. I wish by default scripts wouldn't be loaded until the browser can verify its integrity and external resources wouldn't be loaded until they are defined in the CSP, but sadly this would break the entire web.
@josephrissler9847
@josephrissler9847 Күн бұрын
The javascript tag should have the option to include a hash value that must be verified. Then you can lock version and use the CDN safely. So long as the CDN can't attack the hash, they cannot alter the contents of the script to be executed, yet they can still act as the infrastructure. This wouldn't require any kind of asymmetric signing scheme or anything. The javascript tag itself acts as the authority on the hash. The threat model here assumes that the HTML page containing the javascript tag can be trusted. If the web were to implement this feature, older browsers will still be vulnerable, but ironically, a polyfill could solve that.
@kmcat
@kmcat Күн бұрын
it does it called Subresource Integrity
@Beefster09
@Beefster09 2 күн бұрын
This is why all dependencies should be vendored or embedded Browsers should probably start blocking cross-site JavaScript… and should never have allowed it in the first place
@autohmae
@autohmae 2 күн бұрын
But if you still want to use it, you can also just add a hash in the HTML of whatever you are linking.
@follantic
@follantic 2 күн бұрын
You could easily publish a phishy minified script to npm after purchasing it and not push the real code to git. At this rate it's inevitable that we're going to see a severe long-running and wide reaching attack in the future. Slack uses Node. And they probably upgrade their dependencies reasonably frequently. We're one crafty SOB away from basically all tech companies getting compromised. That is, if it hasn't already happened.
@thelvadam5269
@thelvadam5269 2 күн бұрын
That would break the vast majority of the internet.
@asmithdev2162
@asmithdev2162 2 күн бұрын
This has nothing to do with cross-site javascript, its just a supply-chain attack because the developer didnt own the domain they were using
@MikeC1
@MikeC1 Күн бұрын
​@@asmithdev2162 And anyone that self hosted a trusted copy of the library for their own use isn't affected by this glaring supply chain weakness.
@Kane0123
@Kane0123 2 күн бұрын
The fact that google is blocking certain elements in their ad network is hilarious. Acting like they properly vet any of the ads in their network. Cosplaying as an org that cares.
@nskeip
@nskeip 2 күн бұрын
If you know that guys are going to commit a fraud as a partner in crime, you can end up in a court. So, it's a pretty practical reason to think twice
@diReLoCke
@diReLoCke 4 сағат бұрын
Prime - “I am baffled, I am shocked that I have never thought about this type of attack.” The entire security industry - *openly weeps into their 6th finger of bourbon*
@ethanannane8783
@ethanannane8783 2 күн бұрын
we want more german accent
@Kane0123
@Kane0123 2 күн бұрын
Yah yah
@jerichaux9219
@jerichaux9219 2 күн бұрын
@@Kane0123 Jawohl
@izpodpolja
@izpodpolja 2 күн бұрын
That was a "certified American" moment
@black-snow
@black-snow Күн бұрын
As a German I object.
@jerichaux9219
@jerichaux9219 Күн бұрын
@@black-snow Entschuldigung.
@joyboricua3721
@joyboricua3721 Күн бұрын
Open-source is good still, actually. Private corps can do the same shady functions or roll out vulnerabilities from early deployment, sometimes faulty, incomplete code, probably from using the Agile '$hamework'. Moreover, IRS can identify these type of sales, or LOC on concessions of such projects to other parties, so that NSA can point in the direction of those beckoning for such investigative scrutiny. Don't freak out; it's all part of CW2.
@willw2596
@willw2596 Күн бұрын
Why would people use 3rd party libraries on CDN? Just to save a few bucks on bandwidth? Verify and package any 3rd party libraries yourself. Put dependencies under your control.
@Omnifarious0
@Omnifarious0 Күн бұрын
Given the overall similarity, I think this tells us who was behind the xz attack.
@shadowpenguin3482
@shadowpenguin3482 2 күн бұрын
7:13 what happened to eslint recently?
@AvanaVana
@AvanaVana 2 күн бұрын
June 28th, 2024 was the day that I learned maintaining open sauce js libs is a national security matter for my country
@autohmae
@autohmae 2 күн бұрын
Should have been April 2nd, which is the xz exploit.
@dandogamer
@dandogamer Күн бұрын
I find it wild that clerk is somehow in your node modules like wtf 😮
@copperbadge1
@copperbadge1 2 күн бұрын
This is fine. 🔥
@1234minecraft5678
@1234minecraft5678 2 күн бұрын
Man, there is a very good sok paper on the taxonomy of Software Supply Chain attacks, its wild
@MatildaHinanawi
@MatildaHinanawi 2 күн бұрын
11:00 But if they were benevolent then they would fairly straightforwardly agree to have you check their work. That's a win on all sides situation. Sure the original maintainers MIGHT not feel like they wanna stick to it, but if they wanted to, and the company declined, that would be a clear red flag.
@ikiris9456
@ikiris9456 2 күн бұрын
This has been a spam / malware vector for ages. Its what happened to multiple browser addons as well.
@johanlarsson9805
@johanlarsson9805 20 сағат бұрын
What do you mean "this could totally just happen!"? The more difficult version of it already happened with SSH login failure, so ofcourse this to can happen.
@litfill54
@litfill54 2 күн бұрын
good day mr. Jones!
@yelnil
@yelnil 2 күн бұрын
J Blow has been warning us for years about this
@alexlowe2054
@alexlowe2054 2 күн бұрын
This goes back much earlier than that. People like Stallman predicted this type of behavior back in the 90s. If you have a deep understanding of technology, a concept of how incompetent the average user is, and knowledge of the motivations of the people causing these types of disasters, then the natural extrapolation ends up being pretty accurate. Which is why we unfortunately have to say, yet again, Stallman was right. I bring up Stallman, because it's still impressive for someone to be able to predict self-deleting digital media back in the 90s, when CDs barely existed. You have to be a genius, or insane (or both) to be able to realize that future was possible, and likely, given the status quo of the time. It's a lot less impressive to see Johnathan comment on these things, because he has the advantage to write software at a time when it's entirely technically possible to cause these supply chain attacks. Like, literally, if he had the money and the motivation, he could conduct that type of attack himself. Given that we've had decades to see these problems, to fix them, and we're still failing in the most basic ways, I have little hope that the average software project avoids these security disasters. After all, it was only within the last decade that SQL injection, a solved problem, moved out of the OSWAP top 10. The average software developer doesn't understand or care about security, and when they do, usually it ends up being "deprioritized" by management, in lieu of more features.
@FaultyTwo
@FaultyTwo Күн бұрын
If I have a nickel for every times a Chinese developer injects their backdoor into open-source projects, I would have five. Which isn't a lot but it's really weird if you think about it.
@wjackter
@wjackter 2 күн бұрын
I lost faith in NPM dependencies after the left-pad incident back in 2016
@pastenml
@pastenml 2 күн бұрын
This has nothing to do with npm. It's their cdn that was affected.
@Daniel15au
@Daniel15au Күн бұрын
Polyfill doesn't use npm, and in fact, using npm would have actually avoided this issue since the JS that's loaded can't possibly change unless you update it to a newer version.
@Cygx
@Cygx Күн бұрын
Supply chain attack is a known vulnerability and one of the most powerful
@fennecbesixdouze1794
@fennecbesixdouze1794 4 сағат бұрын
Web browsers should support CORS with content hashes so when you load scripts from a CDN you can add the hashes of the content you're expecting to get back, that way someone can't grab the CDN and replace the script there with something else later. This could even be built into URLs: suppose you could just add something like :~:hash= to your URL, and then if you pull in from a CDN on a script tag the browser would load the content from the URL and then verify the hash of the content matches the hash provided in the URL before executing any content.
@DaviAreias
@DaviAreias Күн бұрын
Don't worry bro, every React library is safe from this, this is why we use npm packages for everything even if there's a browser api replacement.
@kahnfatman
@kahnfatman 2 күн бұрын
Klaus Schwab - WEF
@beanarine3974
@beanarine3974 Күн бұрын
He said open source is screwed but this is the biggest case not only for corporate sponsorship but now also government subsidies of these foundational open source projects and of trusted maintainers
@YumekuiNeru
@YumekuiNeru Күн бұрын
lol yeah how does this not apply to closed source software
@GabrielMillerd
@GabrielMillerd Күн бұрын
On the topic of buying open source, look at the people wanting to buy browser extension accounts, having that existing >100k downloads is huge for people.
@tabochyair
@tabochyair 2 күн бұрын
Insane
@neymarsabin
@neymarsabin Күн бұрын
this is insane
@JamesFreeman
@JamesFreeman 12 минут бұрын
Can't unpublish, but can you replace/update?
@segueoyuri
@segueoyuri 2 күн бұрын
me, a h4ter of JS with literally ZERO node packages installed 😎😎
@krykry606
@krykry606 Күн бұрын
There is a reason noscript exists.
@ristopaasivirta9770
@ristopaasivirta9770 Күн бұрын
"We only need to purchase those who oppose us."
@bitwisedevs469
@bitwisedevs469 Күн бұрын
Fck, just woke up and got an email from Google talking about this Polyfill in one of my old GCP project. I clicked it immediately without much thinking, if that email is fake and will start an exploitation I could be one of its victim. Never access links in email when you just woke up because you may not at the right mind at the moment.
@Songfugel
@Songfugel 2 күн бұрын
Holy Scheiße, this channel for vulnerabilities sounds extremely vulnerable (pun not intended) for misuse
@AJenbo
@AJenbo 2 күн бұрын
9:14 Yep, also been offered lots of $ my github account, more so then for the OSS work I have done.
@arlogodfrey1508
@arlogodfrey1508 2 күн бұрын
I'm surprised we haven't dealt with this already? Not sure if it's a fixable problem on web, needs immutable dependency references like some package managers do.
@alexlowe2054
@alexlowe2054 2 күн бұрын
We kinda did. The package managers can generate immutable version references, but this wasn't an attack on the library code or the package manager. It was an attack on the CDN that hosted compromised versions of those safe packages. There's not really a good way to avoid that type of attack, as long as you don't host your own CDN.
@jerryhuang2258
@jerryhuang2258 2 күн бұрын
tiaozhuan means redirect
@harleyspeedthrust4013
@harleyspeedthrust4013 2 күн бұрын
i knew a jerry huang from school
@satnififu
@satnififu 2 күн бұрын
And then people ask why it's hard to trust software made by Chinese companies
@federicoreina7732
@federicoreina7732 2 күн бұрын
Did Prime stream get DDOS'd after this?
@mikescholz6429
@mikescholz6429 2 күн бұрын
Who puts sudo before npm? Are you new?
@moonasha
@moonasha 22 сағат бұрын
these state sponsored takeovers of open source projects are really getting scary.
@callysibben416
@callysibben416 2 күн бұрын
Seeing Intuit on that list is hilarious
@keaton718
@keaton718 Күн бұрын
Seems like visual page builders with a Google Maps widget use Polyfill, so potentially millions of websites?
@yearswriter
@yearswriter 2 күн бұрын
Kinda need to point out that various chatters with "web is wild I stay embedded" not really safe ether, unless they do use proprietary software and or their software is small nuff to know it completely, which is fair
@NavySturmGewehr
@NavySturmGewehr 2 күн бұрын
Factory Functions?
@marcoscooper1218
@marcoscooper1218 Күн бұрын
I don't understand. Weren't we all taught not to trust CDNs? I remember the senior programmer at that time that we should not trust code that we do not control.
@0xuttc
@0xuttc Күн бұрын
1:42 anyone remember xz ? Practically the same here.
@lyth1um
@lyth1um 2 күн бұрын
held the website provider accountable when visiting the site for content they provide on their domain. imagine, now malware or phishing anymore.
@Gregorius_
@Gregorius_ 2 күн бұрын
bro reading you is HARD
@lyth1um
@lyth1um 2 күн бұрын
@@Gregorius_ yeah, ive re-read my gibberish. its warm at my place.
@masterchief1520
@masterchief1520 2 күн бұрын
Bro what r u saying ​@@lyth1um
@ekv
@ekv 5 сағат бұрын
What happend to eslint?
@Sunrostern
@Sunrostern 2 күн бұрын
Quick, grep your repos!
@pedroalonsoms
@pedroalonsoms Сағат бұрын
thats why i use rust, clean safe language
@cariyaputta
@cariyaputta 2 күн бұрын
Raw js rules.
@reevanthlama2315
@reevanthlama2315 2 күн бұрын
07:29 🤣🤣🤣😂😂😂😂
@nickredfern2689
@nickredfern2689 2 күн бұрын
Universities are subject to export controls for the technologies you can produce to stop technologies that might have dual use (such as heart pumps being used as fuel pumps for missiles). Nation-state attacks like this and XZ on individual devs will lead to government's cracking down on sales of technologies to countries like China. Expect open source to be subject to export controls in the future. If you're going to do open source in the future, get a lawyer.
@Marksman560
@Marksman560 2 күн бұрын
Prime complaining about none-clean code of a hacking scriptkiddy, while destroying readability of his own projects by picking the wrong tool for the job. JS scriptkiddies these days, fighting the wrong battles (No wonder incompetency is winning😛)
@nakedsquirtle
@nakedsquirtle 2 күн бұрын
By picking the wrong tool do you mean requiring that types package?
@channelgogrvk
@channelgogrvk 2 күн бұрын
NIH gang
Күн бұрын
2:47 that’s like mmorpg account trading, but for infosec… oof
@theaifam5
@theaifam5 2 күн бұрын
- $ they paid for, that’s a big L.
@madimakes
@madimakes 2 күн бұрын
wait what who uses sudo to install npm packages?!?!
@bruwyvn
@bruwyvn 2 күн бұрын
Thanks for deleting my explanation YT
@mattymattffs
@mattymattffs Күн бұрын
Using a third party cdn? This is on you
@davidfrischknecht8261
@davidfrischknecht8261 Күн бұрын
LowLevelLearning just posted a video about this issue.
@sophiophile
@sophiophile Күн бұрын
This is all over the place if you look
@Arcangel0723
@Arcangel0723 Күн бұрын
intuit makes a very popular tax filing service in canada... I used it last month lol
@elameend
@elameend 2 күн бұрын
Here before the masses
@zenguru84
@zenguru84 Күн бұрын
Please man.. extract those 10 sec where you say 'Bro as a hacker your code sucks! Can we at least practice clean if we are hacking? this will be viral 🤣🤣
@el_quba
@el_quba Күн бұрын
I'm sorry, but after five minutes of video I know literally nothing about this attack except that it concerns CDN and is craaaazy
@osakitsukiko
@osakitsukiko Күн бұрын
bro turning into xqc
@geliba187
@geliba187 Күн бұрын
Funnull LLC made in USA
@kzalesak4
@kzalesak4 Күн бұрын
Do not use CDN 🤷
@ya64
@ya64 2 күн бұрын
So, CDNs are ruined forever?
@HobbitJack1
@HobbitJack1 Күн бұрын
Anyone who at this point still thinks that the CPC is playing nice is probably somewhere between mislead and stupid.
@JoeTaber
@JoeTaber Күн бұрын
Hey remember when they added Subresource Integrity (SRI) back in 2016? This is why.
@Daniel15au
@Daniel15au Күн бұрын
Not possible to use SRI with polyfill io because the output differs depending on the browser (it only loads the polyfills that are actually needed). Pretty convenient for a supply chain attack!
@Youtub-IDK
@Youtub-IDK 2 күн бұрын
bigboxSWE uploaded a new vid
@x0rZ15t
@x0rZ15t Күн бұрын
EAT ZE BUGZ 🤣🤣🤣
@JakobMusic
@JakobMusic 2 күн бұрын
...agen
@ZeroAme
@ZeroAme 2 күн бұрын
In regards to the whole selling off projects, add a clause to the contract that if the new owner uses the project in any form that can be perceived as malicious, they loose all rights to the project and must hand it back to the original owner with no refund of the sale.
@olazawho
@olazawho Күн бұрын
Unfortunately there's no real way to enforce clauses like that when you're selling to foreign companies
Firing Our Top Talent Was The Best Decision Ever | Prime Reacts
23:19
My Burnout Experience
15:20
ThePrimeTime
Рет қаралды 89 М.
Osman Kalyoncu Sonu Üzücü Saddest Videos Dream Engine 170 #shorts
00:27
Luck Decides My Future Again 🍀🍀🍀 #katebrush #shorts
00:19
Kate Brush
Рет қаралды 8 МЛН
My little bro is funny😁  @artur-boy
00:18
Andrey Grechka
Рет қаралды 9 МЛН
Our Terrible Future And Open Source | Prime Reacts
38:29
ThePrimeTime
Рет қаралды 181 М.
malicious javascript injected into 100,000 websites
12:28
Low Level Learning
Рет қаралды 158 М.
The Pain Of Frontend Dev | Prime Reacts
21:42
ThePrimeTime
Рет қаралды 226 М.
The harsh reality of good software
27:28
ThePrimeTime
Рет қаралды 326 М.
1000 Players - One Game of Doom
15:42
ThePrimeagen
Рет қаралды 161 М.
ExFAANG Engineer Watches ExFAANG Take JavaScript Quiz | Prime Reacts
28:07
I Will Piledrive You If You Say AI Again | Prime Reacts
55:59
ThePrimeTime
Рет қаралды 134 М.
Rob Pike: What Golang Got Right & Wrong
29:23
ThePrimeTime
Рет қаралды 122 М.
AI passed the Turing Test -- And No One Noticed
8:46
Sabine Hossenfelder
Рет қаралды 80 М.
Main filter..
0:15
CikoYt
Рет қаралды 12 МЛН
Телефон в воде 🤯
0:28
FATA MORGANA
Рет қаралды 1,2 МЛН