Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Apple iOS 26 Public Beta Arrival

Critical Mitel flaws allow hackers bypass logins and fully access the Mivoice MX-One system

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google launches OSS Rebuild to expose malicious code in widely used open source packages
Identity

Google launches OSS Rebuild to expose malicious code in widely used open source packages

userBy userJuly 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 23, 2025Ravi LakshmananSoftware Integrity / devsecops

Google has announced the launch of a new initiative called OSS Rebuild to enhance security in its open source package ecosystem and to prevent software supply chain attacks.

“As supply chain attacks continue to target widely used dependencies, OSS Rebuild provides strong data to security teams and provides strong data to avoid compromises without putting any burden on upstream maintainers.”

The purpose of this project is to provide the source of packages for the entire Python package index (Python), NPM (JS/TS), and crates.io (Rust) package registry, and plans to extend it to other open source software development platforms.

Rebuilding the OSS will help you create trustworthy security metadata by leveraging declarative combinations of build definitions, build equipment, and network monitoring capabilities. This can be used to verify the origin of the package and to ensure it has not been tampered with.

Cybersecurity

“We decide and rebuild a positive build definition for the target package through automation and heuristics,” Google says. “Compares the results semantically with existing upstream artifacts and normalizes each to remove instability that causes bit-to-bit comparisons to fail (e.g. archive compression).”

Once a package is reproduced, the build definition and results are exposed through the SLSA source as a proof mechanism that allows users to ensure that their origins are verified, repeat the build process, and customize the build from known functional baselines.

In scenarios where automation cannot fully replicate a package, OSS Rebuild provides a manual build specification that can be used instead.

The OSS Rebuild pointed out by Tech Giant – could help detect supply chain compromises in various categories, such as -.

Published packages containing code that is not present in the public source repository (e.g. @solana/web3.js) suspicious build activity (e.g. tj-actions/chandide-files) Abnormal execution paths or spizer operations are embedded in packages that are difficult to identify in packages that are challenged to identify through manual reviews (e.g. xz utils)

Cybersecurity

In addition to protecting the software supply chain, solutions can improve software material invoices (SBOM), speed up vulnerability response, strengthen package trust, and eliminate the need for CI/CD platforms to take charge of package security for organizations.

“Reconstructions are derived by analyzing published metadata and artifacts and are evaluated against upstream package versions,” Google said. “If successful, the build proof is published for upstream artifacts, verifying the integrity of upstream artifacts and eliminating many sources of compromise.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGlobal CCS Institute on the rise of carbon capture and storage
Next Article How feasible is dual-used space technology?
user
  • Website

Related Posts

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

July 24, 2025

Critical Mitel flaws allow hackers bypass logins and fully access the Mivoice MX-One system

July 24, 2025

Fire Ant Abuse Compromising vmware defective ESXi host and vcenter environment

July 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Apple iOS 26 Public Beta Arrival

Critical Mitel flaws allow hackers bypass logins and fully access the Mivoice MX-One system

Fire Ant Abuse Compromising vmware defective ESXi host and vcenter environment

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.