Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Elon Musk suggests successive xAI withdrawals were a push, not a pull

Microsoft announced that hackers are exploiting a critical zero-day bug to target Windows and Office users.

How to join a16z’s highly competitive Speedrun startup accelerator program

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google launches OSS Rebuild to expose malicious code in widely used open source packages
Identity

Google launches OSS Rebuild to expose malicious code in widely used open source packages

userBy userJuly 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 23, 2025Ravi LakshmananSoftware Integrity / devsecops

Google has announced the launch of a new initiative called OSS Rebuild to enhance security in its open source package ecosystem and to prevent software supply chain attacks.

“As supply chain attacks continue to target widely used dependencies, OSS Rebuild provides strong data to security teams and provides strong data to avoid compromises without putting any burden on upstream maintainers.”

The purpose of this project is to provide the source of packages for the entire Python package index (Python), NPM (JS/TS), and crates.io (Rust) package registry, and plans to extend it to other open source software development platforms.

Rebuilding the OSS will help you create trustworthy security metadata by leveraging declarative combinations of build definitions, build equipment, and network monitoring capabilities. This can be used to verify the origin of the package and to ensure it has not been tampered with.

Cybersecurity

“We decide and rebuild a positive build definition for the target package through automation and heuristics,” Google says. “Compares the results semantically with existing upstream artifacts and normalizes each to remove instability that causes bit-to-bit comparisons to fail (e.g. archive compression).”

Once a package is reproduced, the build definition and results are exposed through the SLSA source as a proof mechanism that allows users to ensure that their origins are verified, repeat the build process, and customize the build from known functional baselines.

In scenarios where automation cannot fully replicate a package, OSS Rebuild provides a manual build specification that can be used instead.

The OSS Rebuild pointed out by Tech Giant – could help detect supply chain compromises in various categories, such as -.

Published packages containing code that is not present in the public source repository (e.g. @solana/web3.js) suspicious build activity (e.g. tj-actions/chandide-files) Abnormal execution paths or spizer operations are embedded in packages that are difficult to identify in packages that are challenged to identify through manual reviews (e.g. xz utils)

Cybersecurity

In addition to protecting the software supply chain, solutions can improve software material invoices (SBOM), speed up vulnerability response, strengthen package trust, and eliminate the need for CI/CD platforms to take charge of package security for organizations.

“Reconstructions are derived by analyzing published metadata and artifacts and are evaluated against upstream package versions,” Google said. “If successful, the build proof is published for upstream artifacts, verifying the integrity of upstream artifacts and eliminating many sources of compromise.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGlobal CCS Institute on the rise of carbon capture and storage
Next Article How feasible is dual-used space technology?
user
  • Website

Related Posts

First malicious Outlook add-in discovered that steals over 4,000 Microsoft credentials

February 11, 2026

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Elon Musk suggests successive xAI withdrawals were a push, not a pull

Microsoft announced that hackers are exploiting a critical zero-day bug to target Windows and Office users.

How to join a16z’s highly competitive Speedrun startup accelerator program

Why are the economics of orbital AI so cruel?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.