Dan Lorenc’s Post

View profile for Dan Lorenc

Chainguard, Inc19K followers

TeamPCP hit LiteLLM (~97M downloads/month) because a maintainer ran Trivy during the wrong window. You didn't have to touch Trivy. You just had to depend on something that did. That's the scariest part: you don't get owned by the tool you used. You get owned by the tool your dependency's maintainer used on a Tuesday afternoon. Your attack surface isn't your code. It's every tool, every maintainer, every machine in the whole chain. And no, your SBOM wasn't going to save you. Nobody is reading SBOMs right now. They're rotating creds and praying their EDR caught something. Reid Tatoris and I are breaking down exactly how this played out and what you can actually do about it. Join us: https://lnkd.in/eQynb5xV

  • graphical user interface, text, application
Dennis Irsigler

METRO MARKETS GmbH375 followers

10h

Is there an AI consumable transcript of this :D ?

Like
Reply
Norm Bond

NormBondMarkets.COM6K followers

4h

This is the part people underweight: your exposure is often decided by the maintainer you never knew you were depending on.

Like
Reply
Bryon Gloden, MSCS

Gloden Cybersecurity…2K followers

1d

The attack surface is not just what you run, it is everything that touched what you run. SBOMs help with visibility, but they do not address trust in the build and release path, which is where this actually breaks. If those paths are not treated as first class assets with enforced integrity, you are operating on assumptions that no longer hold.

Like
Reply
Cole O'Shaughnessy

Chainguard3K followers

11h

Signed up - this should be a good chat

Like
Reply
Atul Tiwary

CorpDev.Ai11K followers

1d

SBOMs help with visibility, but they do not prevent incidents like this. They are not an active control.

Like
Reply
Jason Covey

Chainguard3K followers

1d

Commenting for my network

Like
Reply
See more comments

To view or add a comment, sign in

Explore content categories