this post was submitted on 23 Apr 2026
511 points (98.9% liked)

Selfhosted

58910 readers
310 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] panda_abyss@lemmy.ca 143 points 1 week ago (38 children)

Can we stop using npm now?

I swear to god the number of attacks like this or spawned from other attacks like this is fucking stupid. I’ve gender seen anything like it.

[–] LurkingLuddite@piefed.social 34 points 1 week ago (18 children)

Genuine question. How is NPM more vulnerable than other repos? Haven't similar supply chain attacks succeeded at least as well as this one through GitHub itself and even Linux package repos?

[–] LodeMike@lemmy.today 2 points 1 week ago (4 children)

There's a lot of features that make it a better package manager but nobody cares. Every project has hundreds of dependencies and packages use a minimum, not exact, version.

[–] LurkingLuddite@piefed.social 1 points 1 week ago (2 children)

That sounds more like bad practices from the community. It definitely has ways to use exact versions. Not the least of which the lock file. Or the shrinkwrap file which public packages should be using.

[–] dustyData@lemmy.world 7 points 1 week ago (1 children)

Any security system based on expecting good behavior from people is sure to fail. If NPM has no estructural features to enforce safe behaviors, it is vulnerable by default. As no person using it will apply safe practices unless forced to. Specially if the default, easiest, less friction behavior, is inherently unsafe.

[–] LurkingLuddite@piefed.social 1 points 1 week ago

I wouldn't say pulling in higher versions is unsafe unless an attack like this succeeds. Otherwise it's only an annoyance.

[–] Serinus@lemmy.world 1 points 1 week ago

Then you're waiting forever on vulnerability patches. Especially if there are layers, and each layer waits to update.

load more comments (1 replies)
load more comments (14 replies)
load more comments (33 replies)