Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve our security practices, in particular around binary files #16371

Open
hamogu opened this issue May 2, 2024 · 4 comments
Open

Improve our security practices, in particular around binary files #16371

hamogu opened this issue May 2, 2024 · 4 comments

Comments

@hamogu
Copy link
Member

hamogu commented May 2, 2024

What is the problem this feature will solve?

Recent malicious supply chain attacks have seen binary files slipped into a package (as test files in that case) that served as an attack vector. Could this happen to astropy? How do we prevent it?

Describe the desired outcome

Not clear. This issue is to collect ideas how to address the problem, for example:

  • Be weary of binary files (e.g. compressed files). We don’t have many though, but we want to be careful where we have them.
  • For every binary file, we should ask for the script that generates that binary data.
  • Auto detect in PR and ping security team?
  • We don’t control tests with remote-data. That gets pulled from URLs that could (in principle) have everything. Waht do we do?

Additional context

Automated tools for some security checks exist, e.g.

Infrastructure of security team should run those, see what the results are, fix what’s easy to fix and write down examples where general checks do not apply to astropy (and thus give bad marks).
Goal would be to run those checks in CI for people to look at and decide themselves how useful it is.

@pllim
Copy link
Member

pllim commented May 2, 2024

There are a lot of articles about the "recent attack" but here is one: https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/

@pllim
Copy link
Member

pllim commented May 2, 2024

Maybe some of these could be assisted by NumFOCUS now that they have a Security Committee? 🤔

https://numfocus.org/support

@tupui
Copy link

tupui commented May 2, 2024

Maybe some of these could be assisted by NumFOCUS now that they have a Security Committee? 🤔

numfocus.org/support

@pllim this been shared with the team 👍 (I am on the committee). This also relates to my proposal to make a SPEC around supply chain https://discuss.scientific-python.org/t/spec-8-supply-chain-security/1163

What I am trying to do with the SPEC is to get projects to do exactly what you are doing now: think about such issues and propose some mitigations.

@pllim
Copy link
Member

pllim commented May 8, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants