Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Product
Philipp Burckhardt
August 14, 2024
Socket is introducing three new customizable default security policies: Low Noise (traditional SCA), Default (ideal for most customers), and Higher Noise (for more engaged teams.)
These new policies leverage Socket's four alert actions (Block, Warn, Monitor, Ignore) to offer teams greater flexibility in managing dependency security, from focused CVE monitoring to comprehensive supply chain risk management.
These changes aim to reduce alert noise, manage false positives more effectively, and enable several new alert types that were previously disabled.
The new policies will be made available on August 28, 2024, and existing organizations will be transitioned from the old default policy to the new one on that day. During the two-week transition period (August 14 - August 28), organizations can review the changes and "lock-in" their existing settings if desired.
As you may recall from our previous announcement, we recently expanded our alert system to include four distinct actions: Block, Warn, Monitor, and Ignore. These actions were designed to give organizations more precise control over how to handle notifications:
Building on this foundation, we're now introducing three customizable security policies that make full use of these alert actions. The policies are designed to cater to different team needs and security approaches:
Ideal for teams that want to focus solely on CVEs and malicious dependencies:
Our new default policy balances robust security measures with minimized disruption to developer workflows:
Designed for teams where developers are more actively involved in security vetting:
When configuring your security policy, you have two options for each alert type:
For example, if you set "Critical CVEs" to "Inherit" and choose the "Default" policy, it will be set to "Warn". If you later switch to the "Higher Noise" policy, it will automatically update to "Block". However, if you explicitly set "Critical CVEs" to "Monitor", it will remain as "Monitor" regardless of which default policy you choose.
The following table provides a detailed breakdown of the default alert actions specified in each of the three new security policies that you will be able to choose from:
Alert Type | Low Noise (SCA) | Default | Higher Noise |
---|---|---|---|
Known Malware | Block | Block | Block |
Critical CVE | Warn | Warn | Block |
High CVE | Monitor | Monitor | Warn |
Medium CVE | Monitor | Monitor | Monitor |
Low CVE | Monitor | Monitor | Monitor |
Possible typosquat attack | Ignore | Warn | Warn |
AI-detected potential malware | Ignore | Monitor | Warn |
Protestware/Troll package | Ignore | Warn | Warn |
Git dependency | Ignore | Warn | Block |
GitHub dependency | Ignore | Warn | Block |
HTTP dependency | Ignore | Warn | Block |
Install scripts | Ignore | Ignore | Monitor |
Telemetry | Ignore | Monitor | Warn |
Unpublished package | Ignore | Monitor | Warn |
Unstable ownership | Ignore | Monitor | Warn |
Unpopular package | Ignore | Monitor | Warn |
Deprecated | Ignore | Monitor | Warn |
Unmaintained | Ignore | Ignore | Monitor |
Potential Vulnerability | Ignore | Ignore | Monitor |
Obfuscated File | Ignore | Warn | Warn |
Shrinkwarap | Ignore | Monitor | Warn |
Note: all other of our supported alert types are set to be ignored in the three new policies and will have to be enabled explicitly.
We've made several adjustments in our new default policy based on analysis of user data and customer feedback. Here are the key differences:
These changes were made to strike a balance between security and developer productivity. Our analysis showed that some alerts, while useful, were causing unnecessary disruptions when set to "Block" due to being too noisy (e.g. Install scripts.) At the same time, we've increased visibility on several previously ignored alerts that we believe will be valuable for teams to be aware of.
We're rolling out this update in two key phases:
We're excited about this update and believe it will significantly enhance your experience with Socket. As always, we welcome your feedback as we continue to improve our service.
If you have any questions about, need assistance with this rollout, or have feedback on these changes, please don't hesitate to reach out to our support.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.