In case of NPM version pinning is a good practice. But also set it to ignore post install scripts. They are a bad practice and only about 2 % of all packages use it so it is unlikely it will bother you. They, the post install scripts, were used in recent supply chain attacks btw (the axios). You can either set it project wide in .npmrc file, add ignore-scripts=true, that is good for project where multiple people collaborate. And/Or system wide by running npm config set ignore-scripts true for your personal workspace. You can also achieve it by using --ignore-scripts flag during npm install, but that is way too impractical to always think about it.
Also I would recommend checking npq, its a wrapper around npm cli that will give you some security summary before installing anything (and it is able to give you warning about post install scripts).
- Posts
- 3
- Comments
- 230
- Joined
- 1 yr. ago
- Posts
- 3
- Comments
- 230
- Joined
- 1 yr. ago
Yes, that is exactly how the axios supply chain attack worked... It ran post install script that downloaded malware, ran it and even cleaned it up. Everything on that machine was compromised... It can be any dependency of dependency too, deep down in the tree...