EncryptCodecencryptcodec
Simulations/Supply Chain Attack

Supply Chain Attack

Intermediate

Attackers compromise software by poisoning the dependencies you trust. Identify typosquatted packages, dependency confusion vulnerabilities, and malicious install scripts before they compromise your build pipeline.

Progress:
1
Typosquatting
2
Dependency Confusion
3
Malicious Post-Install
1
Typosquatting
One of these dependencies is a typosquat. Click the malicious package.
// package.json
{
"dependencies": {
"react": "^18.2.0",
"next": "^14.1.0",
"axios": "^1.6.2",
"lodahs": "^4.17.21",
"express": "^4.18.2",
"dotenv": "^16.3.1",
"mongoose": "^8.0.3",
"jsonwebtoken": "^9.0.2",
"bcrypt": "^5.1.1",
"cors": "^2.8.5"
}
}
How to fix supply chain attacks
Lockfiles, auditing, and registry configuration protect your pipeline

Frequently Asked Questions