Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

  • @[email protected]
    link
    fedilink
    English
    21
    edit-2
    3 months ago

    100k sites ignored dependency risks

    JS: typing systems are boring, warnings are boring, security is boring.

    • @Cosmicomical
      link
      English
      -53 months ago

      Sure, the package managers of other languages are super safe

        • @[email protected]
          link
          fedilink
          English
          43 months ago

          Finding new ways webshits fuck up the most basic development principles boggles my mind. It’s like they intentionally stay ignorant.

          • @[email protected]
            link
            fedilink
            English
            13 months ago

            We know, but we don’t have time to change. We have another site waiting to get slammed out as soon as the one we’re working on, which was underfunded with a ridiculous timeline goes live.

            There’s still a fair bit of “my nephew makes websites, it can’t be that [hard, expensive, time consuming], oh and by the way, e we need a way to edit every word and image on the site, that both our intern and barely literate CEO can understand, even though we’re literally never going to edit anything ever.”

      • @[email protected]
        link
        fedilink
        English
        23 months ago

        They’re widely variable. PyPI gets into about as much trouble as npm, but I haven’t heard of a successful attack on CPAN in years (although that may be because no one cares about Perl anymore).