Feross Aboukhadijeh

Coffee with Developers with Feross Aboukhadijeh of Socket about the xz backdoor

A malicious actor gained trust over years to inject a backdoor into a core utility. The xz attack reveals a critical, deep-rooted flaw in open source security.

Coffee with Developers with Feross Aboukhadijeh of Socket about the xz backdoor
#1about 5 minutes

How the xz backdoor exploited maintainer burnout

The xz attack highlights how maintainer burnout creates opportunities for malicious actors to gain trust and take over critical open source projects.

#2about 4 minutes

A historical parallel with the event-stream NPM hack

The 2017 event-stream hack demonstrates a similar pattern of social engineering and highlights how lucky discoveries often expose these backdoors.

#3about 9 minutes

The growing problem of dependency bloat and rot

Modern package managers encourage massive dependency trees, which often include outdated or unnecessary packages that increase the attack surface.

#4about 10 minutes

Detecting protestware and other malicious behaviors

Automated tooling is essential for detecting malicious code like protestware by analyzing package behavior for suspicious activities like file deletion or network access.

#5about 4 minutes

The critical trade-offs of auto-updating dependencies

While updating dependencies protects against known vulnerabilities, updating too quickly can expose you to new, undiscovered supply chain attacks before the community finds them.

#6about 10 minutes

Taking responsibility for your software supply chain

Developers must take responsibility for their dependencies by using lock files, leveraging analysis tools, and understanding that open source transparency aids discovery but doesn't guarantee immediate safety.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 110 - XY marks the spotty security
This time we give you a collection of links about the XZ backdoor, solve the last CODE100 puzzle, announce the next round of it, let you play with colours and explain why Lava lamps are great to keep the web secure.News and ArticlesThe big piece of n...
Dev Digest 110 - XY marks the spotty security
DC
Daniel Cranney
The Overflow: Security and Privacy
Every week we dig through hundreds of links from all over the web, and it’s often hard for developers keep up. So, we thought we’d put together some links we couldn’t fit in the Dev Digest in what we call The Overflow. This week, we’re looking at wha...
The Overflow: Security and Privacy
DC
Daniel Cranney
Dev Digest 206: X Algorithm, Super Monkey Ball, Moltbot vs. Security
Inside last week’s Dev Digest 206 . 👀 How X chooses what you see 🟨 Building a JavaScript runtime in a month and a browser API in one shot 🔲 JavaScript frameworks heading into 2026 ⚠️ AI is getting better at detecting security issues 🔓 Moltbot is a s...
Dev Digest 206: X Algorithm, Super Monkey Ball, Moltbot vs. Security

From learning to earning

Jobs that call for the skills explored in this talk.