Skip to content

Don't upgrade packages less than 7 days old #5195

@harshil21

Description

@harshil21

There have been many supply chain attacks recently involving compromised dependencies. E.g. the recent axios attack (this video does a nice job explaining that situation).

In general, good security practices for dependencies state that you shouldn't update your dependencies instantly - having a buffer period of something like 7 days allows the community to audit packages for malicious behaviour.

Proposal

Set the minimumReleaseAge config option in Renovate.. Additionally, they also recommend setting that in your package manager for transitive dependencies and for lockfiles. pip does not have support for such a thing, but uv does via the exclude-newer flag .

It's unlikely that our users would be affected by security bugs mostly because our release cycle is rather long. This change would benefit anyone developing for the library, because we would be pulling in the latest changes from master.

What do you think, is this a reasonable thing to do or is it rather aggressive?

Metadata

Metadata

Assignees

Labels

⚙️ securityaffected functionality: security

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions