Open Source Sabotage

Discussions center on risks of malicious backdoors and vulnerabilities stealthily introduced into open source projects via trusted contributors or commits, referencing the XZ incident, hypocrite commits research, and Linux kernel review processes.

➡️ Stable 0.8x Security
3,155
Comments
19
Years Active
5
Top Authors
#9216
Topic ID

Activity Over Time

2008
7
2009
14
2010
34
2011
47
2012
71
2013
102
2014
127
2015
110
2016
92
2017
120
2018
155
2019
121
2020
131
2021
599
2022
258
2023
171
2024
669
2025
296
2026
31

Keywords

tar.gz SourceForge DNS indiana.edu UMN crates.io OSS FSF ANY CVS open source code security source open backdoor commits linux malicious attack

Sample Comments

MatthiasPortzel May 27, 2024 View on HN

A reminder that not only open-source projects are at risk of sabotage from trusted members.

PaulHoule Sep 19, 2018 View on HN

It's open source.Everybody would be able to see it. It might be hard to figure out, but you couldn't get away with it forever.For that matter anybody who contributes to Linux could contribute a bad patch. Remember that a bad patch doesn't have to look like it has evil intent, it just looks like the author wasn't being careful with memory and... oops, there is a buffer overflow there.

Estragon Mar 4, 2012 View on HN

It says they've cleared out homakov's modification, but I gather this vulnerability has been around for a long time. Is it paranoid to worry about malicious commits to other github repositories? (By other more surreptitious parties?)

tamimio Aug 19, 2023 View on HN

The sketchy part is it was changed and shipped silently and in a sneaky way, and if it wasn’t for some developer to notice it, he wouldn’t have mentioned it.. However, no need to pushback or anything, consider the maintainer got hit by a bus, fork it, and take it from there.Also, the “security” guy claiming no one is going to read it, do you read linux kernel every update? No, not you, but other developers do, or whenever someone is interested/auditing they can, that kind of arguments a

AnIdiotOnTheNet Dec 31, 2020 View on HN

Considering how long bugs can go unfixed and undetected even in large open source projects, I think it can totally happen. Just create a backdoor that looks like an honest mistake, submit it in a PR that adds some feature or fix, and exploit it at will as people update. Heartbleed took over 2 years to find and fix.

imiric Mar 30, 2024 View on HN

Accepting code from any source without properly reviewing it is surely the actual problem, no? This person only infiltrated this project because there was no proper oversight.Maintainers need to be more stringent and vigilant of the code they ship, and core projects that many other projects depend upon should receive better support, financial and otherwise, from users, open source funds and companies alike. This is a fragile ecosystem that this person managed to exploit, and they likely weren

ikerdanzel May 21, 2021 View on HN

What the uni guys did was correct. The Linux devs only able to review their codes because they are alerted. I am very sure there are plenty of bad faith commits that were accepted by Linux devs. For one, any governments with interest for backdoors with resources beyond the combine all Linux devs would have done it. Instead of appreciating what the uni did, they go beserk because their ego bruised. I am not surprised if within the next 5 years we going to hear more about this issue just that this

djhaskin987 Apr 21, 2021 View on HN

Interesting tidbit from the prof's CV where he lists the paper, interpret from it what you will[1]:> On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits> Qiushi Wu, and Kangjie Lu.> To appear in Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland'21). Virtual conference, May 2021.> Note: The experiment did not introduce any bug or bug-introducing commit into OSS. It demonstrated weakness

rmbyrro Oct 2, 2023 View on HN

Wouldn't it be relatively trivial for someone to compile, compare checksums and call them out?It's more likely they'd introduce a security flaw that is hard to detect in the OSS code. If someone finds, they'd just claim it was a security incident which is now fixed (and then they'd move to another masked flaw).

unclebucknasty Dec 12, 2021 View on HN

I mean it's so inexplicably bad that it's hard to imagine it being an innocent mistake.You have to wonder if opening a ticket for such a feature then having someone (or yourself under another account) build it in such an egregious way is a possible vector for deliberately creating such exploits.If this feature was default enabled, then it's even more suspect. It's just such an esoteric thing.When you factor in this kind of thing with recent revelations about backdoor