• CodexArcanum@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    29
    ·
    edit-2
    2 days ago

    People Developers who download add PyPi packages to their python projects deepseek, packages that are intentionally mislabeled, are getting malware get malware frequently because PyPi, NPM, crates.io, and any other software library are high-value targets for malware authors.

    This happens when any technology picks up in the news. Developers, do the bare minimum research before blindly adding someone else’s code to your computer. I searched for Deepseek on pypi and there’s tons of these things. Here are some signs: random user uploaded it and not either the official account or the account of someone working in the project; simple misspellings in the package description, or basic stuff like description is missing; repository link doesn’t work or is absent; links to repository that is a fork of official repo or is hosted on a small non-standard site (like some person’s random forge.io or gitlab site) On the repo site, check the issues. Do people actually use this library? If they do, they report issues and complain about it.

    These aren’t foolproof but they’ll save you from so so much of this. The most successful instances of this attack are always either: unsophisticated but banking on hype to override your security practices (this deepseek stuff) or else take-overs or infiltration of already popular libraries (the infamous left-pad incident, for example).