How your .NET software supply chain is open to attack : and how to fix it
NuGet's default settings leave your projects vulnerable to supply chain attacks. Learn the two essential configuration changes you need to secure your builds.
#1about 3 minutes
Understanding the risks in your software supply chain
Malicious packages are a growing threat across all major package managers that can lead to data exfiltration from build and developer machines.
#2about 4 minutes
How typosquatting attacks exploit common developer mistakes
Attackers publish packages with common misspellings of popular libraries to execute malicious code when a developer makes a typo.
#3about 4 minutes
A live demo of a typosquatting attack in .NET
A demonstration shows how a misspelled package name can lead to remote code execution during a standard build process using MSBuild targets.
#4about 4 minutes
Using trusted signers to defend against typosquatting
You can secure your nuget.config by requiring signature validation and specifying a list of trusted package owners to prevent unauthorized packages.
#5about 4 minutes
Explaining dependency confusion attacks in the NuGet ecosystem
NuGet's package resolution can be exploited by attackers who publish a public package with the same name as your internal private library.
#6about 3 minutes
A live demo of a dependency confusion attack
A demonstration shows how a floating version reference can cause NuGet to pull a malicious public package over a trusted private one.
#7about 2 minutes
Preventing dependency confusion with package source mapping
The packageSourceMapping feature in nuget.config allows you to explicitly define which source a package pattern should be restored from.
#8about 5 minutes
A summary of key NuGet security best practices
A review of essential security measures includes using trusted signers, package source mapping, reserving prefixes, and signing your own packages.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 216: CyberSec + Mythos, Stack Overflow for Agents & DOOM in TTFInside last week’s Dev Digest 216 .
🧠 Prompts are now tools in Chrome
📜 The AI Coding Agent Manifesto
🔐 How Claude Mythos changes Cyber Security
🧱 GitHub Stacked PRs to battle AI slop
⚙️ Git commands to run before reading code
🐍 A Python framework f...
Daniel Cranney
Dev Digest 191: Malware interviews, EU ❤️ Open Source and Skilled AgentsInside last week’s Dev Digest 191 .
💻 Want to write for the WeAreDevelopers Magazine?
⚒️ Claude skills - a less token hungry MCP?
🫰 How much does Cursor spend on AWS?
🧠 LLMs and Brain Rot
🟥 Change your NPM tokens now!
🧑 Fake AI recruiters delivering...
Daniel Cranney
Dev Digest 214: Claude Is Leaking, GitHub Is Listening & Axios Hacked!Inside last week’s Dev Digest 214 .
🕵️ Claude source code leaked, analysed and re-written in 2 days
🐙 GitHub auto-opts users into feeding their code to train their AI
🌐 Pretext shows how to show complex text rendering in the browser
🤖 How to securin...