You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Document all supply chain protections from recent commits
- Include npm and NuGet configuration settings
- Explain why each protection matters (Axios incident, etc)
- Add maintenance notes for future contributors
- Consolidate duplicate supply chain text into cross-reference
> **Note**: This plugin is registered in `opencode.json` and intercepts all bash commands via the `tool.execute.before` hook. It provides semantic command analysis (not simple pattern matching), shell wrapper detection, and interpreter one-liner detection. Default mode blocks only truly destructive operations while allowing safe git workflows. Configured with `min-release-age=7` in `.npmrc` to prevent supplychain attacks from newly published packages.
259
+
> **Note**: This plugin is registered in `opencode.json` and intercepts all bash commands via the `tool.execute.before` hook. It provides semantic command analysis (not simple pattern matching), shell wrapper detection, and interpreter one-liner detection. Default mode blocks only truly destructive operations while allowing safe git workflows. See [Supply Chain Attack Protection](#supply-chain-attack-protection) for npm security settings.
260
260
261
261
#### .NET Tools
262
262
@@ -1543,3 +1543,79 @@ Developers can easily switch between approaches:
1543
1543
- The "Start both" profile in Visual Studio simplifies launching both projects together
1544
1544
- OAuth flows and API integration work seamlessly in this local development setup
1545
1545
- The simplified workflow is particularly beneficial for design-focused tasks and rapid development
1546
+
1547
+
---
1548
+
1549
+
## Supply Chain Attack Protection
1550
+
1551
+
This project implements defense-in-depth protections against package manager and dependency chain attacks. All protections were added in April 2025.
1552
+
1553
+
### What Are Supply Chain Attacks?
1554
+
1555
+
Attackers compromise trusted packages to infiltrate downstream applications. Common vectors include:
1556
+
1557
+
- Typosquatting (malicious packages with similar names)
1558
+
- Dependency confusion (internal packages masquerading as public)
0 commit comments