Become a partner

Principles of secure software delivery in state administration

Anton Giertli - AppDev Architect, RED HAT ·

Software security is not a one-time task, but a continuous process, because attackers and their techniques evolve. An exceptionally important part is protecting the software supply chain — from code to production. The lecture showed why risks often hide in dependencies and how to bring them under control.

What the Mat JS library incident revealed

Programmers commonly reach for open libraries that speed up development. In the case of the Mat JS library, a clone emerged that offered a “minified” version, but it inserted code into the square root function to send login credentials to the Discord service. Such malicious changes are often hidden in obfuscated code and look innocent at first glance. It is a reminder that attacks can masquerade as routine optimizations.

The risk is amplified by the popularity of libraries and their interconnections: Mat JS was seeing hundreds of thousands of downloads per week, and thousands of other packages depended on it. When a vulnerability appears at such a node, it has the potential to affect a large part of the ecosystem. Attackers count on developers trusting familiar names and automated updates. That’s why we need to look not only at what we use, but also where it comes from and how it was created.

Read more

Anton Giertli

RED HAT
Anton Giertli is a Senior Solution Architect at Red Hat, where he mainly focuses on the development of the Slovak and Czech markets in the field of Cloud, containerization and digitization. He has extensive experience in the field of application development, which he gained mainly as a consultant for the British banking sector, where he particip…

Recommendation speakers

Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným