I reported this and was told it’s a “known low-risk issue” and that they “don’t consider this to present a significant security risk.”
So, let’s look at how this seemingly small issue could be leveraged by a phisher. 1/
Per RFC 6238, a TOTP (Time-based One-Time Password) should be single-use. Allowing reuse, even within the short-ish time window, is not ideal (shoulder surfing, phishing etc.)
I reported this and was told it’s a “known low-risk issue” and that they “don’t consider this to present a significant security risk.”
So, let’s look at how this seemingly small issue could be leveraged by a phisher. 1/
See: dashboard.shadowserver.org/statistics/c...
Check for compromise & patch!
Thank you to Validin & LeakIX for the collaboration!
See: dashboard.shadowserver.org/statistics/c...
Check for compromise & patch!
Thank you to Validin & LeakIX for the collaboration!
If you're not 100% sure you're NOT vulnerable, you should patch your Next.js apps ASAP.
And if you're 100% sure... patch anyway.
dashboard.shadowserver.org/statistics/h...
If you're not 100% sure you're NOT vulnerable, you should patch your Next.js apps ASAP.
And if you're 100% sure... patch anyway.
(Nintendo Museum, Kyoto)
(Nintendo Museum, Kyoto)
For example @zapier/zapier-sdk, with 2.6M weekly downloads, was compromised.
The Collaborators section on the package's NPM page lists over 300 accounts. www.npmjs.com/package/@zap...
For example @zapier/zapier-sdk, with 2.6M weekly downloads, was compromised.
The Collaborators section on the package's NPM page lists over 300 accounts. www.npmjs.com/package/@zap...
"We don't need more code [...], we need more people who care."
"We don't need more code [...], we need more people who care."
Web dev discourse in 2025.
Web dev discourse in 2025.
Concerns that their “increasingly complex and interconnected web of business transactions is artificially propping up the trillion-dollar AI boom.“
@bloomberg.com $NVDA 👀
www.bloomberg.com/news/feature...
Yes, you are a very smart reverser and that's a very clever payload. Yes, rolling out phishing-resistant auth is a slog. No, this is not how we make progress.
</rant>
Yes, you are a very smart reverser and that's a very clever payload. Yes, rolling out phishing-resistant auth is a slog. No, this is not how we make progress.
</rant>
Once more, Coders assemble to present The NPM with their finest work. They celebrate as The NPM flags it all as malware.
No one knows who built The NPM, or why the Takedowning must be observed.
Yet all agree: to neglect it would invite disaster.
Once more, Coders assemble to present The NPM with their finest work. They celebrate as The NPM flags it all as malware.
No one knows who built The NPM, or why the Takedowning must be observed.
Yet all agree: to neglect it would invite disaster.
Other ecosystems can learn a lot from Go's approach to supply chain management, standard libraries, and so on.
For example, see @filippo.abyssdomain.expert's "How Go Mitigates Supply Chain Attacks" go.dev/blog/supply-...
Other ecosystems can learn a lot from Go's approach to supply chain management, standard libraries, and so on.
For example, see @filippo.abyssdomain.expert's "How Go Mitigates Supply Chain Attacks" go.dev/blog/supply-...
A nice countermeasure against accidental installs of short-lived compromised packages before they get taken down. Not a 100% fix, but a great additional step!
A nice countermeasure against accidental installs of short-lived compromised packages before they get taken down. Not a 100% fix, but a great additional step!
Per RFC 6238, a TOTP (Time-based One-Time Password) should be single-use. Allowing reuse, even within the short-ish time window, is not ideal (shoulder surfing, phishing etc.)
Per RFC 6238, a TOTP (Time-based One-Time Password) should be single-use. Allowing reuse, even within the short-ish time window, is not ideal (shoulder surfing, phishing etc.)
Adding a WebAuthn security key and disabling the Authenticator App is a pretty quick process.
For example Apple Touch ID & Windows Hello work! Physical keys work too, but aren't required.
Adding a WebAuthn security key and disabling the Authenticator App is a pretty quick process.
For example Apple Touch ID & Windows Hello work! Physical keys work too, but aren't required.
The compromised versions scan the file system, search for credentials, and post them publicly to GitHub.
www.aikido.dev/blog/popular...
The compromised versions scan the file system, search for credentials, and post them publicly to GitHub.
www.aikido.dev/blog/popular...
2. [object Object]
3. make it fas
2. [object Object]
3. make it fas
tl;dr: no need for tokens or keys, modern browsers tell you if a request is cross-origin!
words.filippo.io/csrf
tl;dr: no need for tokens or keys, modern browsers tell you if a request is cross-origin!
words.filippo.io/csrf