Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

    • PopOfAfrica@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      Imo, computing, like all other things, requires a little trust and risk. The problem is most people are Wayyy to trusting in general.

      • dan@upvote.au
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        3 days ago

        In this case the script wasn’t bundled at all - it was hotlinked from a third party CDN. Adding malicious code instantly affects all the sites that load it.

        The output differs depending on browser (it only loads the polyfills your browser needs) so it’s incompatible with subresource integrity.