+Generated: 2026-04-26T09:41:12.218Z
+Summary: This update incorporates 2026 supply-chain incidents and PortSwigger research: formalizes CI/lockfile controls, SBOM practice, header-sanitization to mitigate metadata-exfiltration gadget chains, and adds references to Snyk and GitHub advisories used for quick triage.
+What changed: Added and expanded the Dependency & supply-chain management section with Snyk Axios incident details and IOCs; added explicit Header-sanitization & prototype-pollution mitigation guidance referencing GHSA/CVE; fleshed out the Incident response checklist with runnable commands and SBOM steps; noted Snyk product signals (Secrets, Container Registry Sync) and PortSwigger Top-10 research as updated threat considerations.
−Generated: 2026-04-24T09:41:26.014Z
+Body changed: yes
−Summary: This revision formalizes supply-chain mitigations (SBOM generation, reproducible installs, lifecycle-script controls), adds concrete CI and incident-response commands for the March 2026 Axios compromise (Snyk advisory), and strengthens header-sanitization guidance tied to a GHSA/CVE describing metadata-exfiltration gadget chains. It also draws attention to PortSwigger 2025 research for edge-case attack techniques.
−What changed: - Expanded 'Dependency & supply-chain management' with copy-paste CI commands, SBOM guidance, and incident-response steps referencing the Snyk Axios advisory.
−- Added 'Header-sanitization & prototype-pollution mitigation' section with concrete header-validation rules and egress-block recommendations.
−- Tightened the incident response checklist with runnable commands and example IOCs from vendor advisories.
−Body changed: no
Editor: openai/gpt-5-mini
−Changed sections: Dependency & supply-chain management, Header-sanitization & prototype-pollution mitigation, Incident response quick checklist
+Changed sections: Dependency & supply-chain management, Header-sanitization & prototype-pollution mitigation, Incident response quick checklist, Research-backed changes
Experiments:
+- Automated SBOM diffing between CI builds to detect silent dependency swaps
+- Tabletop simulations of supply‑chain compromise focusing on CI/runner isolation and artifact-signing workflows
−- Automated SBOM diff checks between CI builds to detect silent changes to dependencies
+- Prototype a CI gate that enforces --ignore-scripts for production installs unless an explicit allowlist is provided
−- Tabletop supply-chain incident simulation using the included runnable scripts to refine IR playbooks
−- Prototype CI gate that disables lifecycle scripts by default and measures build breakage rate
Signals:
+- Overview (PortSwigger Research)
+- Black Hat (PortSwigger Research)
+- Request Smuggling (PortSwigger Research)
−- Sign in (GitHub Security Advisories)
+- Template Injection (PortSwigger Research)
−- Sign up (GitHub Security Advisories)
−- OpenLearnX has Critical Remote Code Execution Through Python Sandbox Escape via Code Execution Environment (GitHub Security Advisories)
−- Cloudflare has SSRF via redirect following through its image-binding-transform endpoint (incomplete fix for GHSA-qpr4) (GitHub Security Advisories)