Hunting for malicious modules in npm - NodeSummit

Product Manager at GitHub
Jul. 27, 2017โ€ขโ€ข
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
Hunting for malicious modules in npm - NodeSummit
1 of 45

More Related Content

What's hot

Security Challenges in Node.jsSecurity Challenges in Node.js
Security Challenges in Node.jsWebsecurify
Continuous testing In PHPContinuous testing In PHP
Continuous testing In PHPEric Hogue
AnyeventAnyevent
AnyeventMarian Marinov
Serenity NowSerenity Now
Serenity NowDaniel MacTough
Async programming on NETAsync programming on NET
Async programming on NETyuyijq
Getting started with TDD - Confoo 2014Getting started with TDD - Confoo 2014
Getting started with TDD - Confoo 2014Eric Hogue

Similar to Hunting for malicious modules in npm - NodeSummit

evil_server.cpp#include string #include cstdlib #include.pdfevil_server.cpp#include string #include cstdlib #include.pdf
evil_server.cpp#include string #include cstdlib #include.pdffortmdu
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Aleksandr Yampolskiy
SSL Failing, Sharing, and SchedulingSSL Failing, Sharing, and Scheduling
SSL Failing, Sharing, and SchedulingDavid Evans
Automated code auditsAutomated code audits
Automated code auditsDamien Seguy
 Test flawfinder.  This program wont compile or run; thats not Test flawfinder.  This program wont compile or run; thats not
Test flawfinder. This program wont compile or run; thats notMoseStaton39
Applications secure by defaultApplications secure by default
Applications secure by defaultSlawomir Jasek

More from Adam Baldwin

Attacking open source using abandoned resourcesAttacking open source using abandoned resources
Attacking open source using abandoned resourcesAdam Baldwin
JavaScript Supply Chain SecurityJavaScript Supply Chain Security
JavaScript Supply Chain SecurityAdam Baldwin
Building a Threat Model & How npm Fits Into ItBuilding a Threat Model & How npm Fits Into It
Building a Threat Model & How npm Fits Into ItAdam Baldwin
Continuous Security - Thunderplains 2016Continuous Security - Thunderplains 2016
Continuous Security - Thunderplains 2016Adam Baldwin
Continuous SecurityContinuous Security
Continuous SecurityAdam Baldwin
Nodevember 2015Nodevember 2015
Nodevember 2015Adam Baldwin

Recently uploaded

Reward Innovation for long-term member satisfactionReward Innovation for long-term member satisfaction
Reward Innovation for long-term member satisfactionJiangwei Pan
Cloud Study Jam ppt.pptxCloud Study Jam ppt.pptx
Cloud Study Jam ppt.pptxPoorabpatel
OpenAI API crash courseOpenAI API crash course
OpenAI API crash courseDimitrios Platis
RemeOs science and clinical data 20230926_PViv2 (4).pptxRemeOs science and clinical data 20230926_PViv2 (4).pptx
RemeOs science and clinical data 20230926_PViv2 (4).pptxPetrusViitanen1
"Stateful app as an efficient way to build dispatching for riders and drivers..."Stateful app as an efficient way to build dispatching for riders and drivers...
"Stateful app as an efficient way to build dispatching for riders and drivers...Fwdays
Take Control of Podcasting thanks to Open Source and Podcasting 2.0Take Control of Podcasting thanks to Open Source and Podcasting 2.0
Take Control of Podcasting thanks to Open Source and Podcasting 2.0๐ŸŽ™ Benjamin Bellamy

Recently uploaded(20)

Hunting for malicious modules in npm - NodeSummit