Trusty is a free-to-use web app that provides data and scoring on the supply chain risk for open source packages.
Browse our latest blog posts, view videos from our team, and more.
Profile selectors, now available in Minder, enable you to customize how profiles are applied to your software supply chain. With selectors, you can apply the right rules to the right resources to increase compliance flexibility and reduce alert fatigue.
On August 29th, Stacklok’s automated threat detection platform alerted us to the presence of malicious code in a newly published PyPI package named "invokehttp." This package raised red flags due to inconsistencies in its metadata and the absence of any verified connection to its claimed GitHub repository. The attacker opted to link the package to a popular Selenium ChromeDriver GitHub repository. This has the same effect of exploiting the repository’s high number of stars, forks, and followers, adding a layer of credibility to invokehttp.
The presence or lack of software vulnerabilities, or CVEs, isn't the only way to determine whether open source software is "safe" to use. In this post, we'll explore other risk factors that you should evaluate to determine which dependencies to use in your software projects.