crates.io phishing attempt
Thanks to my sponsors: Zoran Zaric, Mathias Brossard, notryanb, WeblWabl, Olly Swanson, Marco Carmosino, Valentin Mariette, zed, Berkus Decker, ShikChen, Michael, Chris Emery, Hadrien G., Miguel Raz Guzmán Macedo, Ryan, Olivia Crain, Gioele Pannetto, Seth, Geoff Cant, Michael Alyn Miller and 262 more
Earlier this week, an npm supply chain attack.
It’s turn for crates.io, the main public repository for Rust crates (packages).
The phishing e-mail looks like this:
And it leads to a GitHub login page that looks like this:
Several maintainers received it — the issue is being discussed on GitHub.
The crates.io team has acknowledged the attack and said they’d see if they can do something about it.
No compromised packages have been identified as of yet (Sep 12, 14:10 UTC).
Important links:
Did you know I also make videos? Check them out on PeerTube and also YouTube!
Here's another article just for you:
Getting in and out of trouble with Rust futures
I started experimenting with asynchronous Rust code back when futures 0.1
was all we had - before async/await. I was a Rust baby then (I’m at least
a toddler now), so I quickly drowned in a sea of .and_then, .map_err
and Either<A, B>.
But that’s all in the past! I guess!
Now everything is fine, and things go smoothly. For the most part. But even
with async/await, there are still some cases where the compiler diagnostics are,
just, so much.