-
Notifications
You must be signed in to change notification settings - Fork 218
Open
Description
In an ideal scenario, we should implement an extensible verification pipeline that inspects all extensions and versions before publication, with mechanisms such as:
- Malware detection to identify malicious or suspicious code.
- Name squatting detection to prevent impersonation at the namespace or extension level.
- Secret scanning to catch accidental leaks of API keys or credentials.
- Binary scanning to flag unexpected or potentially harmful binaries.
- Mechanism to prevent artificial inflation of extension popularity
Extensions that fail checks would be quarantined and flagged for admin review.
We should also include basic reporting and alerting to support manual review.
EamonNerbonne and phalston
Metadata
Metadata
Assignees
Labels
No labels