Skip to content

Pin dependencies to reduce risk of supply chain attacks #263

@nigelmegitt

Description

@nigelmegitt

I just noticed that many of the dev dependencies are pinned to latest - that's a practice that we've stopped using in BBC because it provides no protection against supply chain attacks, i.e. where someone maliciously puts code you don't want to run into a dependency, which gets pulled on an install, and run without you realising it.

Instead, we prefer to pin dependencies to exact versions (== not ^ preferably) and use a bot like Dependabot to propose version updates, and in the config specify a "cooldown" period of 7 days so that any updates to dependencies have had a chance to be peer reviewed and any vulnerabilities reported.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions