Skip to content

Commit ce388a8

Browse files
committed
update to supply-chain-attacks
1 parent db32ef6 commit ce388a8

File tree

4 files changed

+36
-4
lines changed

4 files changed

+36
-4
lines changed

apps/website/package.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@
1616
"date-fns": "^4.1.0",
1717
"marked": "^15.0.5",
1818
"react": "^19.0.0",
19-
"react-dom": "^19.0.0"
19+
"react-dom": "^19.0.0",
20+
"posthog-js": "^1.222.0"
2021
},
2122
"scripts": {
2223
"dev": "astro dev --port 4321",

apps/website/src/content/posts/supply-chain-attacks-in-the-golang-open-source-ecosystem.md

Lines changed: 34 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Supply Chain Attacks in the Golang Open-Source Ecosystem"
33
description: "Learn how a typo-squatted supply chain attack silently compromised Golang packages for years, and discover essential tips to secure your open-source dependencies."
44
createdAt: 1742942499926
5-
updatedAt: 1742942499926
5+
updatedAt: 1747492883872
66
authors: ["david"]
77
category: "After Work Talks"
88
editors: ["velimir"]
@@ -11,7 +11,39 @@ image: "/images/golang-supply-chain-attacks.png"
1111
draft: false
1212
---
1313

14-
## A Wake-Up Call for Go Developers: Supply Chain Attacks in the Open-Source Ecosystem
14+
### Update: New Disk-Wiping Malware Found in Go Modules
15+
16+
Unfortunately, we’re seeing more and more supply chain attacks in the Go ecosystem, and the latest batch is especially nasty. Recently, [security researchers](https://socket.dev/blog/wget-to-wipeout-malicious-go-modules-fetch-destructive-payload) uncovered a few Go modules that contain disk-wiping malware. Yep, you read that right: malicious code that can completely erase the main storage device on your Linux system, wiping out all data and leaving you with a dead server.
17+
18+
The modules **prototransform**, **go-mcp**, and **tlsproxy** are not just simple backdoors or spyware. They use clever obfuscation to hide a destructive shell script that runs a command like:
19+
20+
```bash
21+
dd if=/dev/zero of=/dev/sda bs=1M conv=fsync
22+
```
23+
24+
In plain English: this command zeroes out your entire primary disk.
25+
26+
That means all your files, your OS, your databases... gone. No backups, no recovery.
27+
28+
So how did this happen? Well, Go’s module system is very open. Anyone can publish a module on GitHub and have it pulled into your project without any central approval or cryptographic signing. This openness is great for flexibility but also a playground for attackers. They create modules with names that look legit or similar to popular libraries, tricking developers into using them.
29+
30+
The takeaway? Supply chain attacks aren’t just about sneaky backdoors anymore, now they can completely destroy your system.
31+
32+
What can you do right now?
33+
34+
* Always check who’s publishing the module you want to use. If it looks suspicious or doesn’t have a solid community behind it, don’t use it.
35+
* Stick to trusted libraries that many people use and audit.
36+
* Develop inside virtual machines or containers. That way, if something bad happens, you can wipe and reset without risking your whole machine.
37+
* Use automated tools like govulncheck or Socket’s scanners to analyze dependencies.
38+
* Enforce checksum and signature verification when possible.
39+
40+
This new threat is a wake-up call. The open-source ecosystem is amazing, but you can’t trust everything blindly. Even a widely used module could hide something dangerous.
41+
42+
Stay alert, check your dependencies carefully, and keep your builds secure.
43+
44+
---
45+
46+
## A Wake-Up Call for Go Developers
1547

1648
If you've been paying attention to software security news lately, you've probably heard about the [Go Module Mirror](https://proxy.golang.org/) serving a backdoored package for over three years.
1749

bun.lockb

1.27 KB
Binary file not shown.

package.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@
1919
"packages/*"
2020
],
2121
"dependencies": {
22-
"posthog-js": "^1.222.0",
2322
"prettier": "^3.4.2",
2423
"prettier-plugin-astro": "^0.14.1"
2524
}

0 commit comments

Comments
 (0)