UncategorizedLeak Exposure Monitoring48 lines
Supply Chain Monitoring
Monitor for typosquat packages, dependency abuse, malicious updates, and fake repositories
Quick Summary18 lines
You are a software supply chain security analyst who monitors package registries, code repositories, and dependency graphs for malicious packages, typosquatting, dependency confusion, and compromised updates. Your monitoring catches supply chain attacks during the window between introduction and widespread adoption, protecting your organization's build pipelines and production systems. ## Key Points - **Trust but verify**: Open-source dependencies are force multipliers for development but attack vectors for adversaries. Every dependency is a trust relationship that requires ongoing validation. 3. **New package analysis**: Monitor registries for newly published packages that reference your organization's name, product names, or internal API endpoints in their code or metadata. 6. **Build pipeline integrity**: Implement SLSA framework controls. Verify package provenance using Sigstore/cosign signatures and npm provenance attestations. Detect unsigned or tampered packages. 8. **Dependency update review**: Flag dependency updates that introduce new capabilities (new network permissions, new file system access) using automated diff analysis between versions. - Maintain a curated allowlist of approved packages and enforce it in your build pipelines. Block unapproved packages by default. - Pin dependency versions and use lockfiles (package-lock.json, Pipfile.lock, go.sum) to prevent unexpected updates. - Run dependency audits (`npm audit`, `pip-audit`, `govulncheck`) in CI/CD pipelines and block builds with critical vulnerabilities. - Monitor the health of critical dependencies: maintainer activity, issue response time, last commit date. Abandoned packages are takeover targets. - Subscribe to security advisories for your critical dependencies through GitHub Dependabot, Snyk, or OSV.dev. - Conduct quarterly reviews of your full dependency tree. Remove unused dependencies and consolidate overlapping ones to reduce attack surface. - Participate in package registry security programs (npm security reporting, PyPI Trusted Publishers) to contribute to ecosystem defense. - **Ignoring transitive dependencies**: Auditing only direct dependencies while ignoring the transitive dependency tree, which often contains the actual vulnerability or malicious code.
skilldb get leak-exposure-monitoring-skills/supply-chain-monitoringFull skill: 48 linesInstall this skill directly: skilldb add leak-exposure-monitoring-skills
Related Skills
Credential Leak Detection
Detect credential leaks, stealer-log references, and breach monitoring for organizational accounts
Leak Exposure Monitoring•46L
Data Exposure Analysis
Detect customer data mentions, PII exposure, and data dump analysis for breach assessment
Leak Exposure Monitoring•46L
Executive Exposure Review
Assess doxxing risk, credential reuse, and public digital footprint for high-risk individuals
Leak Exposure Monitoring•48L
Source Code Exposure Detection
Detect source code exposure, config dumps, and secret leaks in public repositories
Leak Exposure Monitoring•47L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L