Welcome to our blog
Get the latest insights from our team & community.
What Is "Abandonware" and Is It a Security Risk?
The open-source ecosystem is vast and replete with projects at all stages of development. There are nascent projects that are just getting started and toy projects that were never really intended for...
Design Matters: How We Created Phylum’s Risk Score for Open-Source Packages
Generating meaningful scores for open-source packages is extremely complex. Effective scoring for risk and reputation needs to incorporate disparate pieces of information while also accounting for...
Detecting Potential Bad Actors in GitHub
The vast open-source software ecosystem contains millions of packages and tens of millions of contributing authors. This is both the strength and the weakness of open-source software: its...
The Anatomy of a Malicious Package (Part 2)
Picking up where we left off in the last article, it's time to start thinking about improving our situation. To recap, we've now got initial execution on a victim system, we're able to successfully...
The Anatomy of a Malicious Package
What does a malicious package actually look like in practice? We'll walk through some hypothetical exercises to see how malware generally works, and what sort of functions we might expect, from...