As I understand it, a package author can un-publish their package on 
npmjs.com, and somebody else can publish a package with the same name. If I 
create a package depends on a package from npmjs.org, I have little 
protection against a "bait-and-switch" which could result in unwanted, even 
malicious code being deployed and run. Other software distribution methods 
usually involved signing with a private key to protect against this kind of 
behaviour. Is there something I can do today to protect against this 
without resorting to have to manually perform an audit every time I 
download a package from npmjs.org?

-- 
Job board: http://jobs.nodejs.org/
New group rules: 
https://gist.github.com/othiym23/9886289#file-moderation-policy-md
Old group rules: 
https://github.com/joyent/node/wiki/Mailing-List-Posting-Guidelines
--- 
You received this message because you are subscribed to the Google Groups 
"nodejs" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to nodejs+unsubscr...@googlegroups.com.
To post to this group, send email to nodejs@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/nodejs/e60195a2-e615-4ead-a538-02edb44bf0cd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to