Re: [Wikitech-l] eslint compromised, reset your npm tokens

2018-07-13 Thread Joaquin Oltra Hernandez
The postmortem is interesting: https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes Recommendations > With the hindsight of this incident, we have a few recommendations for npm > package maintainers and users in the future: > >- Package maintainers and users should avoid

Re: [Wikitech-l] eslint compromised, reset your npm tokens

2018-07-12 Thread Prateek Saxena
> Due to a recent security incident, all user tokens have been invalidated. https://status.npmjs.org/incidents/dn7c1fgrr7ng On Fri, Jul 13, 2018 at 1:13 AM, David Barratt wrote: > It's sad to see how the npm team could have taken steps to mitigate this > situation before hand: >

Re: [Wikitech-l] eslint compromised, reset your npm tokens

2018-07-12 Thread David Barratt
It's sad to see how the npm team could have taken steps to mitigate this situation before hand: https://github.com/npm/npm/pull/4016 Important lesson for everyone (including myself). On Thu, Jul 12, 2018 at 11:42 AM C. Scott Ananian wrote: > Further eslint-related packages seem to be infected:

Re: [Wikitech-l] eslint compromised, reset your npm tokens

2018-07-12 Thread C. Scott Ananian
Further eslint-related packages seem to be infected: https://github.com/eslint/eslint/issues/10600 All WM devs with publish access to npm should be using 2FA, which would mitigate this issue. All WM node packages should also be using npm shrinkwrap files; we should probably audit that. --scott