Comment What about Redhat? (Score 1) 41
The article is speaking to the multiple npm/pypi supply-chain attacks, attempts to hijack the trusted delivery chain. I will add that the Redhat compromise speaks to a need to improve elementary access controls. An organisations entire-code repo should not have been available to a single hijacked dev. Perhaps trust-validation and access-certification is something to add to suggested improvements. If nothing else increased friction will frustrate the npm attempted "worm".....