Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I’m concerned stuff like this will lead to a “dark forest” scenario, in which the risks of open source outweigh the benefits.

I’m concerned stuff like this will lead to a “dark forest” scenario, in which the risks of open source outweigh the benefits.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 7 Posters 15 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    At the very least, we're going to need a highly effective spam filter for code contributions

    A This user is from outside of this forum
    A This user is from outside of this forum
    anyone_can_whistle@theforkiverse.com
    wrote last edited by
    #3

    @mttaggart Given that reviewing a PR is already labor-intensive, is it that much marginal effort to ask contributors to hop on a call and verify their humanity? Maybe once they've done it once they can get a credential as a trusted contributor.

    mttaggart@infosec.exchangeM 1 Reply Last reply
    0
    • A anyone_can_whistle@theforkiverse.com

      @mttaggart Given that reviewing a PR is already labor-intensive, is it that much marginal effort to ask contributors to hop on a call and verify their humanity? Maybe once they've done it once they can get a credential as a trusted contributor.

      mttaggart@infosec.exchangeM This user is from outside of this forum
      mttaggart@infosec.exchangeM This user is from outside of this forum
      mttaggart@infosec.exchange
      wrote last edited by
      #4

      @anyone_can_whistle Okay now imagine having to make that request for 1000 PRs that just came in

      A 1 Reply Last reply
      0
      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

        @anyone_can_whistle Okay now imagine having to make that request for 1000 PRs that just came in

        A This user is from outside of this forum
        A This user is from outside of this forum
        anyone_can_whistle@theforkiverse.com
        wrote last edited by
        #5

        @mttaggart I can imagine it being automated; maintainers have a calendly-type thing, so making the appointment is not work for the maintainer. If you want to submit a PR you get on the calendly. I don't really see the incentive for bots to spam a system that is going to human-verify them eventually. Maybe the problem would be that a bad human actor with a bunch of bots would make themself available for the verification.

        A atlefren@snabelen.noA 2 Replies Last reply
        0
        • A anyone_can_whistle@theforkiverse.com

          @mttaggart I can imagine it being automated; maintainers have a calendly-type thing, so making the appointment is not work for the maintainer. If you want to submit a PR you get on the calendly. I don't really see the incentive for bots to spam a system that is going to human-verify them eventually. Maybe the problem would be that a bad human actor with a bunch of bots would make themself available for the verification.

          A This user is from outside of this forum
          A This user is from outside of this forum
          anyone_can_whistle@theforkiverse.com
          wrote last edited by
          #6

          @mttaggart But maybe part of the verification would be actual identity (is anonymity valued in software contributions?). Or maybe the ability to talk through the PR.

          tschenkel@mathstodon.xyzT 1 Reply Last reply
          0
          • A anyone_can_whistle@theforkiverse.com

            @mttaggart I can imagine it being automated; maintainers have a calendly-type thing, so making the appointment is not work for the maintainer. If you want to submit a PR you get on the calendly. I don't really see the incentive for bots to spam a system that is going to human-verify them eventually. Maybe the problem would be that a bad human actor with a bunch of bots would make themself available for the verification.

            atlefren@snabelen.noA This user is from outside of this forum
            atlefren@snabelen.noA This user is from outside of this forum
            atlefren@snabelen.no
            wrote last edited by
            #7

            @anyone_can_whistle @mttaggart i guess many would just quit beeing a maintainer of an open source project if this is the response.

            atlefren@snabelen.noA 1 Reply Last reply
            0
            • atlefren@snabelen.noA atlefren@snabelen.no

              @anyone_can_whistle @mttaggart i guess many would just quit beeing a maintainer of an open source project if this is the response.

              atlefren@snabelen.noA This user is from outside of this forum
              atlefren@snabelen.noA This user is from outside of this forum
              atlefren@snabelen.no
              wrote last edited by
              #8

              @anyone_can_whistle @mttaggart i guess that the era of "open source on ones spare time" will be a thing of the past, at least.

              1 Reply Last reply
              0
              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                I’m concerned stuff like this will lead to a “dark forest” scenario, in which the risks of open source outweigh the benefits. Not today, but it's not impossible tomorrow.

                Link Preview Image
                hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

                A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets. The attacker, an autonomous bot called hackerbot-claw, used 5 different exploitation techniques and successfully exfiltrated a GitHub token with write permissions from one of the most popular repositories on GitHub. This post breaks down each attack, shows the evidence, and explains what you can do to protect your workflows.

                favicon

                (www.stepsecurity.io)

                darby3@zirk.usD This user is from outside of this forum
                darby3@zirk.usD This user is from outside of this forum
                darby3@zirk.us
                wrote last edited by
                #9

                @mttaggart the end goal is the end of open source because who needs it when you can vibe code whatever you need though by paying a specific vibe vendor, right?

                1 Reply Last reply
                0
                • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                  At the very least, we're going to need a highly effective spam filter for code contributions

                  mttaggart@infosec.exchangeM This user is from outside of this forum
                  mttaggart@infosec.exchangeM This user is from outside of this forum
                  mttaggart@infosec.exchange
                  wrote last edited by
                  #10

                  Indeed, this is the kind of anti-human behavior that could necessitate a "hard fork" of the web—or just kill it.

                  Link Preview Image
                  Meditations on The Human Web

                  To save the internet, we may have to rebuild it.

                  favicon

                  (taggart-tech.com)

                  1 Reply Last reply
                  1
                  0
                  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange shared this topic
                  • A anyone_can_whistle@theforkiverse.com

                    @mttaggart But maybe part of the verification would be actual identity (is anonymity valued in software contributions?). Or maybe the ability to talk through the PR.

                    tschenkel@mathstodon.xyzT This user is from outside of this forum
                    tschenkel@mathstodon.xyzT This user is from outside of this forum
                    tschenkel@mathstodon.xyz
                    wrote last edited by
                    #11

                    @anyone_can_whistle @mttaggart

                    I remember having id-keys (gpg, etc) signed be real people, in person, establishing a web of trust.

                    Something like that?

                    Not all of my IDs were real name btw. I had a whole chain of validation with "hacker" handles.

                    1 Reply Last reply
                    0
                    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                      At the very least, we're going to need a highly effective spam filter for code contributions

                      theorangetheme@en.osm.townT This user is from outside of this forum
                      theorangetheme@en.osm.townT This user is from outside of this forum
                      theorangetheme@en.osm.town
                      wrote last edited by
                      #12

                      @mttaggart Make 'em email patches like God intended.

                      1 Reply Last reply
                      0
                      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                        At the very least, we're going to need a highly effective spam filter for code contributions

                        vbfox@hachyderm.ioV This user is from outside of this forum
                        vbfox@hachyderm.ioV This user is from outside of this forum
                        vbfox@hachyderm.io
                        wrote last edited by
                        #13

                        @mttaggart we’ve needed some sort of “reputation” system in OSS (spanning forges and package repositories) a bit more organized than “I’ve seen your pseudonym/avatar on another repo or on Twitter/mastodon) for some time.

                        I just hope it will be thoughtfully done and not hacked in place by a single (Github?) provider in reaction to incidents

                        mttaggart@infosec.exchangeM 1 Reply Last reply
                        0
                        • vbfox@hachyderm.ioV vbfox@hachyderm.io

                          @mttaggart we’ve needed some sort of “reputation” system in OSS (spanning forges and package repositories) a bit more organized than “I’ve seen your pseudonym/avatar on another repo or on Twitter/mastodon) for some time.

                          I just hope it will be thoughtfully done and not hacked in place by a single (Github?) provider in reaction to incidents

                          mttaggart@infosec.exchangeM This user is from outside of this forum
                          mttaggart@infosec.exchangeM This user is from outside of this forum
                          mttaggart@infosec.exchange
                          wrote last edited by
                          #14

                          @vbfox In another context, here's my attempt at reputation for web content: https://ringspace.net

                          1 Reply Last reply
                          1
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups