Advertisement · 728 × 90

Posts by Feross

Wow, our software security practices are really struggling.

22 hours ago 5 1 1 0

🔥 Let's gooooo! More firepower for defending open source.

4 days ago 9 2 0 0
Post image

I’m speaking at AI Council 2026 in San Francisco, May 12–14.

I’ll be diving into AI security topics, including the agent attack surface and how to enable highly autonomous, trusted agents.

Hope to see you there → aicouncil.com #AICouncil

5 days ago 4 1 0 0
Preview
Feross on the 10 Minutes or Less Podcast: Nobody Reads the C... Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Full episode → socket.dev/blog/feross-...

5 days ago 1 1 0 0
We Need AI to Read Open Source Code - Socket CEO Feross Aboukhadijeh
We Need AI to Read Open Source Code - Socket CEO Feross Aboukhadijeh YouTube video by 10 Minutes or Less, with Ali Rohde

Nobody reads the code before installing it.

That’s always been the reality of open source security, but now AI is massively increasing the amount of code being written and shipped.

@feross.bsky.social breaks it down in 10 minutes on @rohdeali.bsky.social's podcast: www.youtube.com/shorts/euRDj...

5 days ago 3 3 1 0
Preview
Don't Kill the Goose That Lays the Golden Eggs - Socket Open source is under attack because of how much value it creates. It has been the foundation of every major software innovation for the last three dec...

🪿 There are some wild takes out there right now about open source being “dead” after recent supply chain attacks and rapid advances in AI-driven security.

Let’s talk goosenomics for a minute. → socket.dev/blog/dont-ki...

1 week ago 14 6 1 2

Goosonomics (noun) 🪿

A hypocritical corporate strategy of extracting immense financial value from unpaid, open-source labor, only to later declare OSS "dead" or untrustworthy to justify forking, rebuilding, and rebundling that exact same software as a premium, "safe" product.

1 week ago 14 5 1 0

Stay safe!

1 week ago 5 0 1 0
Advertisement

🤔

1 week ago 17 2 1 1

PSA: Watch out. Attackers are impersonating a Linux Foundation leader in Slack to target open source developers

1 week ago 3 1 0 0
Preview
Attackers Are Impersonating a Linux Foundation Leader in Sla... OpenSSF has issued a high-severity advisory warning open source developers of an active Slack-based campaign using impersonation to deliver malware.

Attackers are impersonating a @linuxfoundation.org leader in Slack to target #opensource developers with a multi-stage attack that ends in malware delivery. @openssf.org issued a high-severity advisory.

More details and screenshots of the lure: socket.dev/blog/attacke... #infosec

1 week ago 9 5 0 1
Preview
North Korea’s Contagious Interview Campaign Spreads Across 5... Malicious packages published to npm, PyPI, Go Modules, crates.io, and Packagist impersonate developer tooling to fetch staged malware, steal credentia...

North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads
Socket
socket.dev/blog/contagi...
@socket.dev

1 week ago 1 2 0 0
On TBPN: Feross Discusses the Axios Attack and Today’s Open Source Security Landscape
On TBPN: Feross Discusses the Axios Attack and Today’s Open Source Security Landscape YouTube video by Socket Security

🚀 @socket.dev's first appearance on TBPN. We talked about what's been an intense week in supply chain security and why AI is accelerating the problem.

We've been building for exactly this moment.

www.youtube.com/watch?v=EeJg...

1 week ago 8 3 0 0
Preview
Attackers Are Hunting High-Impact Node.js Maintainers in a C... Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

North Korea is targeting npm maintainers.

Not for crypto. For write access to packages downloaded trillions of times a year.

Lodash. Fastify. axios. mocha. Node.js core. Even @feross.bsky.social and several @socket.dev engineers!

socket.dev/blog/attacke...

2 weeks ago 16 8 0 1
Video

"The whole software supply chain is built on blind trust. You're downloading code from random people on the internet that you've never met, and you're like, let's just run it." - @feross.bsky.social on TBPN talking about the Axios compromise.

Full interview → socket.dev/blog/feross-...

1 week ago 8 6 0 0
On TBPN: Feross Discusses the Axios Attack and Today’s Open Source Security Landscape
On TBPN: Feross Discusses the Axios Attack and Today’s Open Source Security Landscape YouTube video by Socket Security

🚀 @socket.dev's first appearance on TBPN. We talked about what's been an intense week in supply chain security and why AI is accelerating the problem.

We've been building for exactly this moment.

www.youtube.com/watch?v=EeJg...

1 week ago 8 3 0 0

It's absolutely unbelievable the levels of social engineering maintainers have to be alert to these days. Hopefully the general media pick up on @sarahgooding.bsky.social's story to raise awareness more widely. #npm #nodejs #security

2 weeks ago 9 3 0 0

Most critical OSS projects don’t have independent security budgets, so it's not unusual that even something as central as @nodejs.org depended on pooled funding models like the IBB. If open source consumers want these kinds of security incentives to exist, they need to step up to fund them.

2 weeks ago 10 4 0 0
Advertisement

this is one of my favorite parts of the @vlt.sh CLI. it uses @socket.dev security data to prevent known malware from running lifecycle scripts like postinstall!

and it’s powered by queries under the hood so you could make it as granular as you wanted (but we ship with safe defaults)

2 weeks ago 16 7 0 0
Preview
The Hidden Blast Radius of the Axios Compromise - Socket The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

We’re seeing cases where teams can’t explain how they were compromised by the Axios incident because it doesn’t show up in their project's lockfile. The blast radius here is much larger than it looks.

Deep dive into the messy reality of modern dependency resolution → socket.dev/blog/hidden-...

2 weeks ago 17 11 0 0

⚠️ If you're running local mcp servers, you need to do the following:

1. Individually "install" packages you want to use, within a specified directory: (e.g. $HOME/mcp) creating a lockfile

2. Add: "--include-workspace-root --workspace $HOME/mcp --no --offline" to EVERY npx call

2 weeks ago 9 3 2 0

@sapcommunity.bsky.social @recap-conf.bsky.social another reason to stop using axios in SAP packages like cap or ai-sdk. Standard js APIs should suffice. Fetch is safer, lighter, and better.

2 weeks ago 9 1 2 0

Letting one get drowned in (Re)DoS vulnerabilities to the degree that one develops severe alert fatigue is dangerous. Just look at today's security incident – those things are dangerous to everyone.

2 weeks ago 2 1 0 0

New month, new GitHub bot spam notifications 🙄

3 weeks ago 4 4 0 0
Preview
VP of Engineering About Us Socket helps devs and security teams ship faster by cutting out security busywork. Thousands of orgs use Socket to safely find, audit, and manage open source code. Our customers — from Anthr...

We're hiring for our first VP of Engineering at Socket.

You'll work directly with @feross.bsky.social to lead and scale a high-performing, deeply technical engineering team tackling some of the hardest problems in software supply chain security.

⚡️Apply here: jobs.ashbyhq.com/socket/09d8b...

3 weeks ago 7 2 1 0
Post image Post image Post image

We're at RSA this week! Come by and say hi!

Supply chain attacks are accelerating, AI coding tools are creating new attack surfaces, and we've been busy building.

Find us at The Metreon (161 4th St) -- we have a private suite Mon–Thu, 8am–5pm. Book time with me here: socket.dev/book/rsa

4 weeks ago 5 0 0 0
Post image Post image Post image

We're at RSA this week! Come by and say hi!

Supply chain attacks are accelerating, AI coding tools are creating new attack surfaces, and we've been busy building.

Find us at The Metreon (161 4th St) -- we have a private suite Mon–Thu, 8am–5pm. Book time with me here: socket.dev/book/rsa

4 weeks ago 3 0 0 0
Advertisement
Preview
Trivy Supply Chain Attack Expands to Compromised Docker Imag... Newly published Trivy Docker images (0.69.4, 0.69.5, and 0.69.6) were found to contain infostealer IOCs and were pushed to Docker Hub without correspo...

🚨 Breaking: Trivy Docker images are compromised.

Tags 0.69.4, 0.69.5, and 0.69.6 contain infostealer IOCs. The latest images were pushed to Docker Hub without corresponding GitHub releases. `latest` currently points to a malicious image.

Details: socket.dev/blog/trivy-d...

4 weeks ago 5 2 0 0

FYI if you're using Trivy in CI right now:

75 of 76 tags on the official GitHub Action were force-pushed to serve malware. Affects 10K+ workflows.

If you're not on v0.35.0, assume compromise.

cc: @campuscodi.risky.biz @thehackernews.bsky.social @zackwhittaker.com @bleepingcomputer.com

1 month ago 4 7 0 1
Preview
Trivy Under Attack Again: Widespread GitHub Actions Tag Comp... Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

🚨 Breaking: Trivy GitHub Actions supply chain attack – 75 out of 76 version tags compromised.

If your CI/CD pipelines reference “aquasecurity/trivy-action” by version tag, you’re likely running malware right now.

Full write-up: socket.dev/blog/trivy-u...

1 month ago 8 1 0 0