stencil-golang
stencil-golang | VaRA-Tool-Suite | |
---|---|---|
1 | 1 | |
4 | 13 | |
- | - | |
8.9 | 8.1 | |
5 days ago | 5 days ago | |
Smarty | Python | |
Apache License 2.0 | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
stencil-golang
-
Backdoor in upstream xz/liblzma leading to SSH server compromise
Here's a PR on an employer-owned public Github repository where I made a change and Jared approved it. Please, let's not witch hunt.
https://github.com/getoutreach/stencil-golang/pull/404
VaRA-Tool-Suite
-
Backdoor in upstream xz/liblzma leading to SSH server compromise
I tried to understand the significance of this (parent maybe implied that they reused a completely fictitious identity generated by some test code), and I think this is benign.
That project just includes some metadata about a bunch of sample projects, and it links directly to a mirror of the xz project itself:
https://github.com/se-sic/VaRA-Tool-Suite/blob/982bf9b9cbf64...
I assume it downloads the project, examines the git history, and the test then ensures that the correct author name and email addresses are recognized.
(that said, I haven't checked the rest of the project, so I don't know if the code from xz is then subsequently built, and or if this other project could use that in an unsafe manner)
What are some alternatives?
xz - XZ Utils [GET https://api.github.com/repos/tukaani-project/xz: 403 - Repository access blocked]
openconnect
libusb - A cross-platform library to access USB devices
xz-backdoor-github - History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.
Pack - Pack
lbzip2 - Parallel bzip2 utility