-
Notifications
You must be signed in to change notification settings - Fork 474
Description
Hi there,
in our privat github org we've received a couple of malware warnings.
I'm responsible for one of the repos that got flagged with a CWE-506 Weakness. It only says The product contains code that appears to be malicious in nature.
There is no specific line of the supposedly malicious code being provided.
An npm audit does not suggest any fixes nor have I implemented anything into the repo in the lasts months. The last package was published 3 months ago.
Any advice on how to proceed here? Thanks in advance!
update:
these are two additional incidents we found in our organisation.
GHSA-jrfr-qx3j-84p5
GHSA-2h9r-w2r5-m764
As it turns out, contrary to my first message here, we were indeed target of a supply chain attack.
https://socket.dev/npm/package/@oneaudi/unified-web-common/diff/1.6.8 check out the socket.dev link. We've never actually published those packages.
somebody published the malicious package which is within our private org into the public npm registry.
How do we proceed from here, can the Advisory against our private org package be removed again?