2. of Tampering (2022 deck) III
An attacker can modify your build system and produce signed builds of your software:
Threat |
|
You’re using an open source third-party library and an attacker modifies the library and uploads it to the public repository, which, when downloaded during the build, gets integrated into your product. |
|
CAPEC |
CAPEC-446: Malicious Logic Insertion into Product via Inclusion of Third-Party Component CAPEC-538: Open-Source Library Manipulation CAPEC-186: Malicious Software Update CAPEC-442: Infected Software |
ASVS |
1.14.3: Ensure vulnerable second and third-party components are not being used |
CWE |
CWE-507: Trojan Horse |