Bsides Kerala Supply Chain Outside Code

Bsides Kerala 2025 Thiruvananthapuram, India
1 / 33
Slide 1 of Bsides Kerala Supply Chain Outside Code
Slide 2 of Bsides Kerala Supply Chain Outside Code
Slide 3 of Bsides Kerala Supply Chain Outside Code
Slide 4 of Bsides Kerala Supply Chain Outside Code
Slide 5 of Bsides Kerala Supply Chain Outside Code
Slide 6 of Bsides Kerala Supply Chain Outside Code
Slide 7 of Bsides Kerala Supply Chain Outside Code
Slide 8 of Bsides Kerala Supply Chain Outside Code
Slide 9 of Bsides Kerala Supply Chain Outside Code
Slide 10 of Bsides Kerala Supply Chain Outside Code
Slide 11 of Bsides Kerala Supply Chain Outside Code
Slide 12 of Bsides Kerala Supply Chain Outside Code
Slide 13 of Bsides Kerala Supply Chain Outside Code
Slide 14 of Bsides Kerala Supply Chain Outside Code
Slide 15 of Bsides Kerala Supply Chain Outside Code
Slide 16 of Bsides Kerala Supply Chain Outside Code
Slide 17 of Bsides Kerala Supply Chain Outside Code
Slide 18 of Bsides Kerala Supply Chain Outside Code
Slide 19 of Bsides Kerala Supply Chain Outside Code
Slide 20 of Bsides Kerala Supply Chain Outside Code
Slide 21 of Bsides Kerala Supply Chain Outside Code
Slide 22 of Bsides Kerala Supply Chain Outside Code
Slide 23 of Bsides Kerala Supply Chain Outside Code
Slide 24 of Bsides Kerala Supply Chain Outside Code
Slide 25 of Bsides Kerala Supply Chain Outside Code
Slide 26 of Bsides Kerala Supply Chain Outside Code
Slide 27 of Bsides Kerala Supply Chain Outside Code
Slide 28 of Bsides Kerala Supply Chain Outside Code
Slide 29 of Bsides Kerala Supply Chain Outside Code
Slide 30 of Bsides Kerala Supply Chain Outside Code
Slide 31 of Bsides Kerala Supply Chain Outside Code
Slide 32 of Bsides Kerala Supply Chain Outside Code
Slide 33 of Bsides Kerala Supply Chain Outside Code

Abstract

Challenges the assumption that securing code dependencies is sufficient, systematically demonstrating supply chain attack vectors in browser extensions, IDE plugins, CI/CD systems, containers, and beyond.

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation at Bsides Kerala challenges the common assumption that securing code dependencies is sufficient for software supply chain security. Anant Shrivastava demonstrates that the real attack surface extends far beyond source code — encompassing browser extensions, IDE plugins, CI/CD systems, container images, dependency caching servers, package managers, and even the developer’s own machine. Through real-world case studies and a structured ATOM framework, the talk provides a practical roadmap for identifying and mitigating these overlooked supply chain vectors.

Key Topics Covered

The Broader Supply Chain Problem:

  • The industry has focused too heavily on software code dependencies while ignoring other chain types
  • Organizations face dependency chains far beyond code: pluggable modules, plugins, extensions, theming, and customizations
  • Any software that allows third parties to add or modify functionality is a potential supply chain vector

Why Non-Code Chains Matter:

  • Production environments are hardened, but development environments are not
  • It is easier to compromise less-guarded paths than to breach production directly
  • Smaller organizations within a supply chain are easier to infiltrate, occupy, or acquire

Developer Machine as a High-Value Target:

  • Developers hold extensive credentials and access tokens
  • Security exceptions are commonly granted to development environments (network policy relaxations, admin access)
  • Multiple powerful applications (IDEs, debuggers, etc.) expand the attack surface
  • A compromised developer machine provides a foothold into the entire software pipeline

Browser Extension Attacks:

  • Chrome extensions have been backdoored at scale — dozens discovered across 2.6 million devices
  • The “EditThisCookie” extension was cloned maliciously to steal session cookies
  • Browser extensions can access sensitive data, modify page content, and exfiltrate credentials

IDE and Editor Risks:

  • Malicious VS Code extensions have been found with millions of installs
  • Notepad++ plugins have been hijacked and impersonated via parasite websites
  • These attacks exploit developer trust in familiar tooling ecosystems

Installation Script Dangers (WYS Is Not WYG):

  • Content can be delivered differently to curl and browsers, enabling targeted payloads
  • Piping curl output directly to shell (curl | sh) is inherently dangerous due to potential mid-stream content manipulation

Package Manager Code Execution:

  • APT and RPM package managers support pre/post-install scripts that execute arbitrary code
  • These are unexpected but legitimate code execution paths that attackers can exploit

CI/CD System Vulnerabilities:

  • CI/CD systems control the entire build and deployment pipeline, making them critical targets
  • Global TeamCity exploitation opened the door to SolarWinds-style supply chain compromises
  • NSA/CISA guidance specifically addresses defending CI/CD environments

Container Image Risks:

  • The shift from installing software to downloading container images introduces new trust problems
  • Malicious containers have been discovered on Docker Hub, targeting the container supply chain

Dependency Caching and Bait-and-Switch:

  • Go module proxy caching has been exploited for malicious package persistence
  • WordPress plugins have been purchased by malicious actors and then backdoored — affecting 300,000+ installations
  • Rogue maintainers have sabotaged popular npm packages (node-ipc, colors.js, faker.js) for political or destructive purposes

The ATOM Framework:

  • Awareness: Identify and move unknown risks into known risks
  • Trust But Verify: Every dependency, tool, and service should be validated
  • Ongoing Monitoring: Continuous security checks to detect changes and anomalies
  • Measure & Map: Build capabilities to answer real questions (e.g., how many machines have Chrome installed? How many plugins exist in GitHub workflows?)

Actionable Takeaways

  1. Audit your non-code supply chains — browser extensions, IDE plugins, CI/CD actions, and container base images — with the same rigor applied to source code dependencies.
  2. Implement the ATOM framework: start with Awareness (inventory all dependency types), then Trust But Verify (validate each tool and service), establish Ongoing Monitoring (continuous anomaly detection), and Measure & Map (build queryable visibility).
  3. Restrict and monitor developer machine configurations — catalog installed extensions, enforce extension allowlists, and limit administrative privileges where possible.
  4. Never pipe installation scripts directly to shell; always download, inspect, and then execute.
  5. Harden CI/CD pipelines following NSA/CISA guidance, including signed commits, protected branches, forced pull request reviews, and GitHub Actions security auditing.
  6. Monitor for bait-and-switch and rogue maintainer risks by tracking package ownership changes and reviewing update diffs for popular dependencies.

Embed This Presentation

See Also

supply-chain