composer/packagist has the exact same dependency security risks as node.js.
(Reposted)
Objectively, they all frustrate validation the same. When comparing with a SLSA3-compliant setup where every installed artifact has a signed checksum in a signed bundle from a signed resource on a signed repository, and the endpoint to this is readily available from something like authenticated SNMP into the single source of truth, they all tends to compare poorly.
The chart below completely ignores that Debs are consolidated into a single source of truth as well, and I feel violating SSoT should cost significantly because of dependency holes when artifact registry is incomplete, but SLSA doesn’t care about that part.
Ecosystem / Format
Estimated SLSA Level
Update Reliability / Model
Trust Chain & Provenance Comments
(withheld)
3–4
Very high; repo-based, transactional updates
Strong: signed packages + signed repo metadata + central DB; distros enforce reproducible builds.
PHP was only worse because of the syntax. The ecosystem around it with composer and other tools has always been superb.
composer/packagist has the exact same dependency security risks as node.js.
(Reposted)
Objectively, they all frustrate validation the same. When comparing with a SLSA3-compliant setup where every installed artifact has a signed checksum in a signed bundle from a signed resource on a signed repository, and the endpoint to this is readily available from something like authenticated SNMP into the single source of truth, they all tends to compare poorly.
The chart below completely ignores that Debs are consolidated into a single source of truth as well, and I feel violating SSoT should cost significantly because of dependency holes when artifact registry is incomplete, but SLSA doesn’t care about that part.