- GitHub will enforce 2FA and write off older tokens to improve the packaging security of the packaging
- Trusted Publishing will expand and token-based publishing will be limited by default
- Shai-Hulud Worm violated NPM, which resulted in the removal of over 500 compromised packages
After a series of recent high -profile attacks and hacking attempts, GitHub has decided to make significant changes in security on its platform.
In a blog post detailed GitHub changes for approval and release to go live “in the near future” for the purpose of publication of curing package.
The notification of approval and publication notification will be changed to include local release with required 2FA, granular tokens with a seven-day expiry date and trusted release.
Additional approval and protection
In addition, GitHub announced that it would write off the Legacy Classic tok’s as well as time-based one-time password (TOTP) 2FA, forcing users to migrate to FIDO-based 2FA. It will also limit granular tokens by publishing permits for a shorter expiry and setting publishing access to reject tokens by default (this should cause users to go for trusted publishers or 2FA enforced local publishers).
The possibility of bypassing 2FA for local parcel release is removed, while the list of eligible providers for trusted publishers will be expanded.
“We recognize that some of the security changes we make may require updates to your workflows,” Github explained.
“We will gradually roll out these changes to ensure that we minimize disturbance while strengthening NPM’s safety position. We are obliged to support you through this transition and will provide future updates with clear timelines, documentation, migration guides and support channels.”
Open source software is crucial in the software development industry with organizations of all sizes – from companies to micro -bus – by tapping into the sea of high quality code. This also makes it ideal for cyber criminals participating in third-party and supply chain attacks.
An example is the recent Shai hole attack, where a self-replicating worm malware infiltrated the NPM ecosystem via a compromised maintenance account and started stealing all kinds of secrets from software developers.
The attack forced GitHub to remove more than 500 compromised packages as well as block uploading new packages that contain regardless of indicators of compromise available at that time.



