Skip to main content

NPM supply chain attack - why our platform is secure

· One min read
Robert Loipfinger
Cirlce Lead Platform @ ADITO

What happened

This week, attackers compromised developer accounts on npmjs.org and published manipulated versions of well-known open-source packages. These packages are downloaded billions of times each week. The injected code was designed to capture data and redirect transactions.

Why this does not affect us

Our platform is not impacted. We only use dependencies that are reviewed and built into the product through controlled processes. Nothing is ever pulled directly from npm at runtime. Every update passes through our CI/CD pipeline and is tested before it is released.

The ADITO Designer loads components dynamically, but only from explicitly defined and versioned packages. It does not resolve or install unspecified or floating versions such as latest. This prevents unintended updates and ensures that only verified, expected package versions are used.

Conclusion

This incident underlines the importance of supply-chain security. Thanks to our architecture, our strict versioning rules, and our controlled processes, we can state clearly: our customers and partners are not affected by this attack.

./Robert