alt.hn

3/15/2026 at 7:58:45 AM

Supply-chain attack using invisible code hits GitHub and other repositories

https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/

by tannhaeuser

3/15/2026 at 12:59:39 PM

Weird article. The author talks about Unicode "public use areas" (which don't exist), clarifies that they're sometimes called "public use access" (a term appearing only in this article) and are invisible while also being used for flags and emojis and also having special meaning to JavaScript interpreters and also representing letters in the "US alphabet".

There's a real vulnerability here but whoever wrote this has no idea what they're talking about.

by rogual

3/15/2026 at 10:01:58 AM

Can anyone recommend any OSS tooling that could be used in something like a GH action workflow to automatically screen for these types of static attacks on code? Seems like something that should be part of an automated review pipeline if it's getting so hard for humans to visually review against this kind of stuff.

by sigseg1v

3/15/2026 at 11:36:11 AM

A linter that disallows any code that uses eval in any form seems like a good start to me.

by IneffablePigeon

3/15/2026 at 1:46:17 PM

What about for languages that allow pretty much anything in identifiers or variables. JS for example. Or bash. Don't need eval to do anything crazy there.

by sigseg1v

3/15/2026 at 12:29:21 PM

[dead]

by testacccount1