docs/THREAT_MODEL.md
What threats we think of when we design our tool and process.
Attacker put malware to PostCSS
devDependenciesso maintainer will be injected and their credentials will be stolen to put malware now in this package.
Solutions:
npm 2FA is on hardware token, so even maintainer machine compromising will not lead to leaking full-time credentials.The tool’s dependencies will be hijacked and malware will be installed to all tool’s users.
Solutions:
Malware in tool’s dependencies can write some script into the tool’s source code. A maintainer releases it unnoticed.
Solutions:
pnpm without a postinstall script.pnpm with minimumReleaseAge with 1 day cool down.