Looks like the package is still in the proxy, and sadly is used by one 
known person.

It would be useful if the proxy site had a tamper warning at the top of a 
package’s page when the code hash for the version has changed. Perhaps it 
would be useful to list all the tampered packages in a master list so we 
can see how pervasive the problem is.

On Wednesday, February 5, 2025 at 5:11:17 AM UTC-8 peterGo wrote:

> Go Module Mirror
>
> FYI
>
> Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching 
> for Persistence    
>
> https://socket.dev/blog/malicious-package-exploits-go-module-proxy-caching-for-persistence
>  
>    
>
> Go Module Mirror served backdoor to devs for 3+ years    
>
> https://arstechnica.com/security/2025/02/backdoored-package-in-go-mirror-site-went-unnoticed-for-3-years/
>  
>    
>
> Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching 
> for Persistence    
>
> https://www.reddit.com/r/golang/comments/1ii6l00/go_supply_chain_attack_malicious_package_exploits/?rdt=54944
>  
>    
>
> x/pkgsite: links can point at source code that may not match what is 
> served by the module proxy #66653
> https://github.com/golang/go/issues/66653
>
> peter
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/golang-nuts/339b5b35-f44c-4b2a-ac7c-7d7e7a4ffa5an%40googlegroups.com.

Reply via email to