RagTags for ResCommunes

the machines have taken over

OWASP #8 (2021) – Software and Data Integrity Failures

This category focuses on trust - specifically, trusting the integrity of software, updates, and data.

Problems arise when: - Apps load code from CDNs or third parties without verifying integrity. - CI/CD pipelines deploy code without signature checks. - Systems auto-update from untrusted or unsigned sources. - Dependency chains include compromised or malicious packages.

A now-famous example is the SolarWinds supply chain attack, where trusted software updates delivered backdoors.

To defend against this: - Use digital signatures for software and artifacts. - Verify the integrity of third-party libraries and update sources. - Secure the CI/CD pipeline and control who can push code. - Treat software supply chains as a potential attack surface.

Assume attackers will try to slip malicious code in through the side door - integrity failures are about preventing that.