This document discusses supply chain attacks via the software build system and dependencies. It provides examples of real-world attacks where dependencies or build tools were compromised, including the CCleaner and MS Tools attacks. It then outlines various ways a build system and dependencies could be attacked, such as compromising continuous integration infrastructure, dependencies from public repositories, and external services like build caches. Finally, it discusses best practices for securing the build system and dependencies, including signing code, repository filtering, dependency verification, and reproducible builds.
Related topics: