Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hundreds of organizations that violated SharePoint Mass-Hacks

Eight months later, Swedish Unicorn Lovely Crosses a $100 million milestone

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google launches OSS Rebuild to expose malicious code in widely used open source packages
Identity

Google launches OSS Rebuild to expose malicious code in widely used open source packages

userBy userJuly 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 23, 2025Ravi LakshmananSoftware Integrity / devsecops

Google has announced the launch of a new initiative called OSS Rebuild to enhance security in its open source package ecosystem and to prevent software supply chain attacks.

“As supply chain attacks continue to target widely used dependencies, OSS Rebuild provides strong data to security teams and provides strong data to avoid compromises without putting any burden on upstream maintainers.”

The purpose of this project is to provide the source of packages for the entire Python package index (Python), NPM (JS/TS), and crates.io (Rust) package registry, and plans to extend it to other open source software development platforms.

Rebuilding the OSS will help you create trustworthy security metadata by leveraging declarative combinations of build definitions, build equipment, and network monitoring capabilities. This can be used to verify the origin of the package and to ensure it has not been tampered with.

Cybersecurity

“We decide and rebuild a positive build definition for the target package through automation and heuristics,” Google says. “Compares the results semantically with existing upstream artifacts and normalizes each to remove instability that causes bit-to-bit comparisons to fail (e.g. archive compression).”

Once a package is reproduced, the build definition and results are exposed through the SLSA source as a proof mechanism that allows users to ensure that their origins are verified, repeat the build process, and customize the build from known functional baselines.

In scenarios where automation cannot fully replicate a package, OSS Rebuild provides a manual build specification that can be used instead.

The OSS Rebuild pointed out by Tech Giant – could help detect supply chain compromises in various categories, such as -.

Published packages containing code that is not present in the public source repository (e.g. @solana/web3.js) suspicious build activity (e.g. tj-actions/chandide-files) Abnormal execution paths or spizer operations are embedded in packages that are difficult to identify in packages that are challenged to identify through manual reviews (e.g. xz utils)

Cybersecurity

In addition to protecting the software supply chain, solutions can improve software material invoices (SBOM), speed up vulnerability response, strengthen package trust, and eliminate the need for CI/CD platforms to take charge of package security for organizations.

“Reconstructions are derived by analyzing published metadata and artifacts and are evaluated against upstream package versions,” Google said. “If successful, the build proof is published for upstream artifacts, verifying the integrity of upstream artifacts and eliminating many sources of compromise.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGlobal CCS Institute on the rise of carbon capture and storage
Next Article How feasible is dual-used space technology?
user
  • Website

Related Posts

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

July 23, 2025

A new approach to the challenges of 10 years ago

July 23, 2025

Sysaid flaws under active attacks enable remote file access and SSRF

July 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hundreds of organizations that violated SharePoint Mass-Hacks

Eight months later, Swedish Unicorn Lovely Crosses a $100 million milestone

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

Proton’s new Privacy First AI Assistant encrypts all chats and does not keep logs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.