The Software Extinction Event That Wasnโ€™t

Note: This blog post was previously published on DevOps.com Imagine if the worldโ€™s most pervasive programming language, used in the majority of organizations, services, websites and infrastructure today, was itself made to be malicious? Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker containerโ€ฆ due to the popularity of โ€ฆ

PyPI Leaked Token in Binary

Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Pythonโ€™s, PyPIโ€™s and Python Software Foundationโ€™s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public repositories such as Docker Hub, โ€ฆ

Contextual Analysis for Python, Java, and JavaScript with JFrog Frogbot

Contextual Analysis for Python, Java, and JavaScript Projects with JFrog Frogbot

When scanning packages, CVE (Common Vulnerabilities and Exposures) scanners can find thousands of vulnerabilities. This leaves developers with the painstaking task of sifting through long lists of vulnerabilities to identify the relevance of each, only to find that many vulnerabilities donโ€™t affect their artifacts at all. Vulnerability Contextual Analysis uses the artifact context to eliminate โ€ฆ

Python Package Index (PyPi)

Python wheel-jacking in supply chain attacks

Recently, a novel supply chain attack was published by security researcher Alex Birsan, detailing how dependency confusion (or โ€œnamesquattingโ€œ) in package managers can be misused in order to execute malicious code on production and development systems. Background โ€“ dependency confusion & Birsanโ€™s attack In short, most package managers such as pip and npm do not โ€ฆ