Advance malicious / broken module detection #243
littledivy
started this conversation in
General
Replies: 2 comments 1 reply
-
This could be integrated well with module scoring, 👍🏻 |
Beta Was this translation helpful? Give feedback.
1 reply
-
analyzer is the repo for this. Converting this to a discussion. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Currently our malicious/broken module detection is manual making it an experience based reporting system i.e we just let the users complain.
Proposal -
Analyze every source file (js/ts) and dependencies in the module source code as and when a new version is published.
How -
It may sound difficult to implement something like this but luckily we have
swc
which makes things very easy for us.swc_ecma_visit
(used bydeno_lint
) we can look for malicious commands that could possibly be executed withDeno.run
, etc and warn users while importing.deno_swc
Where -
This is most likely to be a part of the Rust API but it will be available as a rust crate for other registries to implement.
Why -
No other package registry has any automatic module detection system so we would probably be the first to do this.
Beta Was this translation helpful? Give feedback.
All reactions