this post was submitted on 23 Apr 2026
607 points (99.7% liked)

Selfhosted

58738 readers
1270 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] anyhow2503@lemmy.world 12 points 1 day ago (1 children)

Npm probably has the biggest attack surface and many of the libraries hosted there are in extremely widespread use. They've taken some steps to mitigate these supply chain attacks, but as we've seen with more recent examples, it's unrealistic to think they can be prevented completely. Most of these attacks use stolen developer credentials, which invalidates almost all potential security measures on the registry side and the best you can hope for is catching a malicious package quickly. To be clear: I think the JS ecosystem is uniquely positioned to be the prime target of supply chain attacks and while that doesn't excuse the slow implementation of security measures from the npm team, the people arguing that other package managers and registries aren't vulnerable to this have to be huffing fumes.

[–] panda_abyss@lemmy.ca 7 points 1 day ago (2 children)

That’s fair, I won’t pretend pypi/pip and running uvx is much safer than npx.

But why hasn’t JavaScript established a defacto stdlib to replace ask the left pads and is even type packages?

I’ve taken a near zero dependency policy on my personal projects regardless, and now I run most code in containers to sandbox it.

[–] savedbythezsh@sh.itjust.works 2 points 17 hours ago

If you're asking why there isn't one shipped with JS, the answer is because JS is built for the web, and the "don't break the web" rule makes changing things in JS hard, as well as browser devs pushing back hard on anything that increases install size.

If you're asking why as a community, we haven't agreed on a single package to be a stdlib - lodash.

[–] anyhow2503@lemmy.world 3 points 21 hours ago

But why hasn’t JavaScript established a defacto stdlib to replace ask the left pads and is even type packages?

I'm guessing things were working out pretty alright, even with the insane amount of dependencies per project. The awareness and the increasing frequency of supply chain attacks is relatively recent for npm. But who knows, maybe the tech giants in control of the web standards are happy to keep using their own vendored registries.