Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

  • @PopOfAfrica
    link
    English
    -67 months ago

    I only allow JS on a whitelist.

    • @9point6
      link
      English
      19
      edit-2
      7 months ago

      A whitelist wouldn’t mitigate this issue entirely due to bundling

      • @[email protected]
        link
        fedilink
        English
        2
        edit-2
        7 months ago

        In this case the script wasn’t bundled at all - it was hotlinked from a third party CDN. Adding malicious code instantly affects all the sites that load it.

        The output differs depending on browser (it only loads the polyfills your browser needs) so it’s incompatible with subresource integrity.

    • @PopOfAfrica
      link
      English
      47 months ago

      Imo, computing, like all other things, requires a little trust and risk. The problem is most people are Wayyy to trusting in general.