Skip to content

Commit a34f81e

Browse files
authored
Merge pull request #23 from JosephTLucas/motivating_examples
CONTENT: Motivating Security Examples
2 parents 2ed615d + f359e14 commit a34f81e

File tree

2 files changed

+18
-0
lines changed

2 files changed

+18
-0
lines changed

bestpractices/_toc.yml

+1
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,5 @@ parts:
1212
- file: content/static-analysis
1313
- caption: Enablers
1414
chapters:
15+
- file: content/motivating-examples
1516
- file: FAQ
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
# Securing Open Source Software: Our Responsibility
2+
3+
NumFOCUS-supported projects occupy a unique and critical position in the scientific and data-driven ecosystem. The tools and libraries we develop are relied upon by researchers, analysts, and engineers across academia, industry, and government. These projects often serve as the computational backbone for groundbreaking work, making them an essential part of the software supply chain. While we may not operate production systems directly, the widespread use of our software makes it an attractive target for attackers. Our role in this ecosystem bestows a certain responsibility to safeguard the secure and integrity of our work.
4+
5+
## Lessons from Recent Incidents
6+
7+
Two recent events highlight the importance of security in open source development:
8+
9+
1. **Ultralytics Package Compromise**
10+
In late 2024, the Python package [ultralytics](https://github.com/ultralytics/ultralytics) was the target of a supply chain attack. Attackers exploited GitHub Actions workflows and an exposed PyPI API token to publish malicious versions, which were downloaded before being identified and removed. This incident underscores the need for secure workflows and credential management. PyPI posted a great review of the [incident here](https://blog.pypi.org/posts/2024-12-11-ultralytics-attack-analysis/) including recommendations for PyPI publishers.
11+
12+
2. **XZ Utils Backdoor**
13+
Earlier in 2024, versions of XZ Utils were found to contain a backdoor. This code allowed attackers with a specific cryptographic key to execute remote commands and was given the maximum CVSS score of 10.0. The insertion of this backdoor into most Linux distributions took approximately three years and was based in social engineering. Read more: [XZ Utils Backdoor — Everything You Need to Know, and What You Can Do](https://www.akamai.com/blog/security-research/critical-linux-backdoor-xz-utils-discovered-what-to-know).
14+
15+
## Read More to Improve Security
16+
17+
Your goal should be to adopt best practices to reduce risk, and we're here to help! The NumFOCUS Security Committee has collected these best practices and is focused on distilling the plethora of security-information into actionable guidance for NumFOCUS projects, acknowledging your unique placement in the supply chain, requirements, and constraints.

0 commit comments

Comments
 (0)